Networks

Review: 3 Free Bootable Rescue Discs

We recently reviewed some free bootable antivirus discs that you can use to scan and remove malware from outside of Windows. Now we’ll review some general bootable rescue di...

Penetration Testing Shows Unlikely Vulnerabilities

The Spider Labs division of security firm Trustwave conducts over 2,000 penetration tests a year looking for IT security risks. While some audits find normal flaws, there are some that lead to the d...

Two Factor Authentication: SMS vs. Tokens

The numbers are staggering. About 750 million airline passengers must remove their shoes every year because one lone nut, Richard Reid (now a resident of a supermax prison in Colorado), once tried t...

IPv6 Will Cause Some Security Headaches

IPv6 is the next-generational internet protocol, designed to give us more IP addresses. Back in the day when no one dreamed that toasters would one day be connected to the Internet, the idea that th...

Defending Against The ‘Apache Killer’ Exploit

The Apache HTTP web server is the most widely deployed Web server on the Internet today and it's at risk from a serious denial of service (DoS) attack.The 'Apache Killer' tool is now out in the wild...

The Pros and Cons of Opal Compliant Drives

  Full-disk encryption (FDE) used to be a software-only proprietary solution. But over the past couple of years, a hardware based hard drive standard has emerged in...

Password Roulette: Betting on Password Storage Apps

Call Ondrej Krehel the poster boy for the password problem that is confronting all of us. Password protection on corporate servers is proving to be dangerously porous -- think Sony, Citigroup, even ...

Is IT Security Just an Illusion?

A recent survey by the Ponemon Institute found that the threat from cyber attacks is nearing statistical certainty -- 90 percent of U.S. businesses were hit by at least one security breach in the la...

How to Configure your Wireless Network from WEP to WPA2

  As you may already know, WEP security can easily be cracked -- which is why it is a good idea to upgrade to WPA2 (Wi-Fi Protected Access 2). WEP security only ...

How to Wipe a Computer Clean

Before you sell or get rid of your computers—whether working or not—you should clean them of sensitive documents and data. To be completely safe, you should do this even if ...

Latest articles