Five steps to successful and cost-effective penetration testing

Tuesday, May 27th, 2008

Whether you hire outside consultants or do the testing yourself, here are some tips for making sure your time and money are well spent. 1. Set goals. Make sure you know before you start your penetration testing what you want the results to encompass. Adding in too many systems can be ...

Ad-Aware 2008 Has Arrived!

Saturday, May 24th, 2008

We’re proud to announce: Ad-Aware 2008 Free, Plus, and Pro versions are now available. While we continue to offer a full-powered anti-spyware solution that is free of charge for personal home use, with this new release, there’s more reason than ever to boost your defenses with our Plus or Pro products. ...

Newest Firefox Beta has Critical Flaws, Mozilla Admits

Saturday, May 24th, 2008

Mozilla has identified 10 high-priority bugs in Firefox 3.0, three of them pegged "critical," but won't decide until next week whether to release the browser anyway or restart the final stretch by issuing a second release candidate (RC2). "We are making a go/no go decision early next week, as we are ...

Vista’s UAC spots rootkits

Saturday, May 24th, 2008

Love or hate its nagging prompts, Vista's Account Control feature (UAC) has a security feature that marks it out from any other type of Windows security programme -- it can spot rootkits before they install. This is one finding buried in a report published in two German computer ...

Facebook security snafu could compromise accounts

Friday, May 23rd, 2008

A researcher has spotted a security problem in Facebook that could lead to hackers taking control of user accounts. The flaw allows a hacker to execute scripts on Facebook that could potentially be used to create a fake log-in page and capture people's passwords, according to the XSSED security blog. The ...