- Welcome Guest
- Sign In
For years there existed a fuzzy distinction between good and bad computer hackers. Black Hat hackers were known to crack into computer systems for the challenge and the bragging rights. These miscreants took great pleasure from wreaking havoc once they gained entry. White Hat hackers, on the other side of the ethical line, broke into systems to alert company officials to their ineffective security measures. As concerns about network security grew, computer security companies sprung up and often recruited their experts from the ranks of the White Hatters...
Spyware and its intimate partner, adware, are among the fastest growing threats to computer users. Many Internet security experts now view spyware and adware as variations of the same thing -- intrusion ...
Today is the federally mandated deadline for investment companies and other publicly owned firms to be in compliance with internal auditing controls stipulated by the Sarbanes-Oxley (SOX) Act of 2004. However, it appears many companies might miss the deadline ...
Some Internet security experts don't place much hope for pending antiphishing legislation to do much to prevent ID theft and related scams. They view the prospect of new laws as being too little, too late to stop an out-of-control problem ...
An industrywide survey shows that corporate networks are being bombarded with spyware infiltration in record numbers, but relatively few corporations are deploying adequate solutions to combat the threat ...
Dell has declared war on spyware with its announcement on October 20 that all of its computers will ship with a free security software package. Dell will begin bundling the security package in its computers as soon as the spyware component is ready, something company officials expect will occur between early November and the holidays ...
Biometric technology has been around for more than a decade with little fanfare. However, interest is heating up for biometric security devices in communications. Iris scanners, voice recognition modules and fingerprint readers promise to raise the bar on locking down access to computers, networks, Web sites and even cell phones ...
Antivirus software is a required component for safe computing. Security experts warn that an unprotected computer straight out of the box and connected to the Internet will catch multiple virus infections in its first 20 minutes online ...
Biometric security, at least in theory, has been around for a decade. But the use of biometrics for computer security and user authentication has failed to attract much practical interest to date because the clunky devices were costly, inconvenient, and intrusive ...
Spyware and its intimate partner, adware, are among the fastest growing threats to computer users. Many Internet security experts now view spyware and adware as variations of the same thing -- intrusion ...
One year ago, the prospects for developing biometrics as a reliable security device for computers were viewed by many industry watchers as a nice idea with little applicable potential. After all, biometric security devices have been available in one form or another for 30 years. But the use of biometrics for computer security and user authentication lacked much enthusiasm because of ill-placed perceptions that the procedures were costly, inconvenient and intrusive...
In the financial workplace, e-mail and instant messaging (IM) are becoming essential enterprise tools. Once the province of teens chatting with their friends, instant messaging is now relied on by brokerage firms and other financial companies to maintain contact with clients. An ever-increasing number of government regulations and industry-specific rules make compliance with secure-messaging criteria mandatory...
The Recording Industry Association of America (RIAA) is continuing to wage its war against peer-to-peer (P2P) file-sharing networks. On August 25, the RIAA filed new copyright infringement lawsuits against 744 individuals on a variety of peer-to-peer platforms, including eDonkey, Limewire, Grokster and Kazaa ...
The Internet has brought dramatic changes to the way companies communicate and people conduct their business relationships. One of the hottest marketing trends for businesses across all industry lines involves using the power of the Internet to provide virtual meeting spaces. Web conferencing and Web-based seminars are quickly replacing traditional business travel and telephone conference-call strategies...
Computer users, faced with never-ending security attacks from surfing the Internet and opening e-mail, are showing increased interest in switching Web browsers. Downloads of popular non-Microsoft Web browsers have doubled this summer, software makers say ...
The browser war is once again being waged by a half dozen or more software companies who are fighting for a bigger share of the Web browser real estate. But as alternative Web browsers become more popular, so are intrusions by hackers aimed at them ...
The Internet industry has been waging a quiet battle for bragging rights to being king of the e-mail security mountain in recent months. Proponents of a new e-mail security standard dubbed Sender ID might soon claim that title ...
The Voice Over IP landscape has changed considerably in the last few years. The easy availability of broadband access to the Internet, coupled with Herculean leaps in technology, makes VoIP service a viable alternative to traditional telephone and PBX offerings ...
Spyware is so prevalent that it is becoming nearly impossible to find computers that do not contain at least some intrusive code lurking on the hard drive or buried deep within the Windows Registry ...
A newly formed antiphishing group is promising to introduce ways to shut down the spread of online identity fraud scams. Shawn Eldridge, chairman of the new group, Trusted Electronic Communications Forum, sees results coming within the next four to six months ...
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/10/digital-identity.jpg
https://www.linuxinsider.com/story/ai-expert-claims-big-tech-using-fear-of-ai-to-scare-up-profits-178748.html
AI Expert Claims Big Tech Using Fear of AI To Scare Up Profits
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/frustrated-computer-user.jpg
https://www.linuxinsider.com/story/atlas-vpn-linux-leak-exposes-users-ip-addresses-177164.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/computer-programmers.jpg
https://www.linuxinsider.com/story/ai-will-have-a-transformative-impact-on-software-development-in-2024-178950.html
AI Will Have a Transformative Impact on Software Development in 2024
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineers-code.jpg
https://www.linuxinsider.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/01/devops.jpg
https://www.linuxinsider.com/story/2023-year-of-the-software-developer-177724.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/smartphone-user-happy.jpg
https://www.linuxinsider.com/story/how-to-speed-up-a-suddenly-slow-android-phone-178982.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/12/Monoprice-CrystalPro-27-inch-productivity-monitor.jpg
https://www.linuxinsider.com/story/monoprice-crystalpro-27-monitor-delivers-productivity-convenience-at-a-bargain-price-178833.html
Monoprice CrystalPro 27″ Monitor Delivers Productivity, Convenience at a Bargain Price
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/10/security-team.jpg
https://www.linuxinsider.com/story/it-and-security-leaders-baffled-by-ai-unsure-about-security-risks-study-178716.html
IT and Security Leaders Baffled by AI, Unsure About Security Risks: Study
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/linux-security.jpg
https://www.linuxinsider.com/story/when-betting-on-linux-security-look-at-the-big-picture-177155.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/02/IT-team.jpg
https://www.linuxinsider.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html
Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/07/programmer-coding.jpg
https://www.linuxinsider.com/story/if-only-documentation-looked-as-clean-as-the-code-178455.html