Search Results

Results 1881-1900 of 1949 for Jack M. Germain
BEST OF ECT NEWS

Moral Dilemma: Hackers for Hire

For years there existed a fuzzy distinction between good and bad computer hackers. Black Hat hackers were known to crack into computer systems for the challenge and the bragging rights. These miscreants took great pleasure from wreaking havoc once they gained entry. White Hat hackers, on the other side of the ethical line, broke into systems to alert company officials to their ineffective security measures. As concerns about network security grew, computer security companies sprung up and often recruited their experts from the ranks of the White Hatters...

BEST OF ECT NEWS

Opt-In Marketing Offers an Alternative to Spyware, Adware

Spyware and its intimate partner, adware, are among the fastest growing threats to computer users. Many Internet security experts now view spyware and adware as variations of the same thing -- intrusion ...

Companies Scrambling To Meet SOX Deadline Today

Today is the federally mandated deadline for investment companies and other publicly owned firms to be in compliance with internal auditing controls stipulated by the Sarbanes-Oxley (SOX) Act of 2004. However, it appears many companies might miss the deadline ...

Will Antiphishing Legislation Be Effective?

Some Internet security experts don't place much hope for pending antiphishing legislation to do much to prevent ID theft and related scams. They view the prospect of new laws as being too little, too late to stop an out-of-control problem ...

INDUSTRY REPORT

Enterprise Spyware Threats Reach All-Time High

An industrywide survey shows that corporate networks are being bombarded with spyware infiltration in record numbers, but relatively few corporations are deploying adequate solutions to combat the threat ...

Dell Spyware Decision Spurs New Trend

Dell has declared war on spyware with its announcement on October 20 that all of its computers will ship with a free security software package. Dell will begin bundling the security package in its computers as soon as the spyware component is ready, something company officials expect will occur between early November and the holidays ...

TECHNOLOGY REVIEW

Biometric Cell Phones Coming – But US Will Be Last

Biometric technology has been around for more than a decade with little fanfare. However, interest is heating up for biometric security devices in communications. Iris scanners, voice recognition modules and fingerprint readers promise to raise the bar on locking down access to computers, networks, Web sites and even cell phones ...

SOFTWARE

Virus Outbreak Filters New Tool To Block Infections

Antivirus software is a required component for safe computing. Security experts warn that an unprotected computer straight out of the box and connected to the Internet will catch multiple virus infections in its first 20 minutes online ...

INNOVATION

IBM Introducing Fingerprint Reader into Laptop

Biometric security, at least in theory, has been around for a decade. But the use of biometrics for computer security and user authentication has failed to attract much practical interest to date because the clunky devices were costly, inconvenient, and intrusive ...

Opt-In Marketing Offers Alternative to Spyware, Adware

Spyware and its intimate partner, adware, are among the fastest growing threats to computer users. Many Internet security experts now view spyware and adware as variations of the same thing -- intrusion ...

Biometrics: A Security Makeover

One year ago, the prospects for developing biometrics as a reliable security device for computers were viewed by many industry watchers as a nice idea with little applicable potential. After all, biometric security devices have been available in one form or another for 30 years. But the use of biometrics for computer security and user authentication lacked much enthusiasm because of ill-placed perceptions that the procedures were costly, inconvenient and intrusive...

SPECIAL REPORT

E-Mail and Instant Messaging Face Compliance Challenges

In the financial workplace, e-mail and instant messaging (IM) are becoming essential enterprise tools. Once the province of teens chatting with their friends, instant messaging is now relied on by brokerage firms and other financial companies to maintain contact with clients. An ever-increasing number of government regulations and industry-specific rules make compliance with secure-messaging criteria mandatory...

SPECIAL REPORT

Beyond File Sharing: P2P Radio Arrives

The Recording Industry Association of America (RIAA) is continuing to wage its war against peer-to-peer (P2P) file-sharing networks. On August 25, the RIAA filed new copyright infringement lawsuits against 744 individuals on a variety of peer-to-peer platforms, including eDonkey, Limewire, Grokster and Kazaa ...

SPECIAL REPORT

Web Conferencing Comes of Age

The Internet has brought dramatic changes to the way companies communicate and people conduct their business relationships. One of the hottest marketing trends for businesses across all industry lines involves using the power of the Internet to provide virtual meeting spaces. Web conferencing and Web-based seminars are quickly replacing traditional business travel and telephone conference-call strategies...

SPECIAL REPORT

Internet Explorer, Security Concerns and Browser Alternatives

Computer users, faced with never-ending security attacks from surfing the Internet and opening e-mail, are showing increased interest in switching Web browsers. Downloads of popular non-Microsoft Web browsers have doubled this summer, software makers say ...

SPECIAL REPORT

Browser War: Alternative Web Browsers Gaining Popularity

The browser war is once again being waged by a half dozen or more software companies who are fighting for a bigger share of the Web browser real estate. But as alternative Web browsers become more popular, so are intrusions by hackers aimed at them ...

INDUSTRY REPORT

Sender ID Gains Favor for Top E-Mail Security

The Internet industry has been waging a quiet battle for bragging rights to being king of the e-mail security mountain in recent months. Proponents of a new e-mail security standard dubbed Sender ID might soon claim that title ...

TECHNOLOGY SPECIAL REPORT

VoIP Lined Up as Wave of Future

The Voice Over IP landscape has changed considerably in the last few years. The easy availability of broadband access to the Internet, coupled with Herculean leaps in technology, makes VoIP service a viable alternative to traditional telephone and PBX offerings ...

TECHNOLOGY SPECIAL REPORT

New Era of Deadly Spyware Approaches

Spyware is so prevalent that it is becoming nearly impossible to find computers that do not contain at least some intrusive code lurking on the hard drive or buried deep within the Windows Registry ...

SPECIAL REPORT

New Internet Security Forum Seeks To End Phishing

A newly formed antiphishing group is promising to introduce ways to shut down the spread of online identity fraud scams. Shawn Eldridge, chairman of the new group, Trusted Electronic Communications Forum, sees results coming within the next four to six months ...

LinuxInsider Channels