Posts Tagged ‘hackers’

As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible. That’s why secure remote access is a component frequently found in the digital toolboxes of service providers that offer maintenance, troubleshooting and support from locations other than where the product [...]

Government Computer News – NIST spells out baseline security requirements for next-gen mobile devices CSO – Election sabotage: A threat much older than hacked e-voting InformationWeek – Malware Tools Get Smarter To Nab Financial Data SearchSecurity – Remote access Trojan evades detection using mouse functions Share this:EmailFacebookPrint

Government Computer News – NIST spells out baseline security requirements for next-gen mobile devices CSO – Election sabotage: A threat much older than hacked e-voting InformationWeek – Malware Tools Get Smarter To Nab Financial Data SearchSecurity – Remote access Trojan evades detection using mouse functions Share this:EmailFacebookPrint

*Editor’s Note: These columns originally appeared in TechTarget’s SearchEnterpriseWan.com By Rainer Enders, CTO of Americas for NCP engineering The simplest way to do this is to act like a hacker. Snoop around the network traffic, either on the device itself or a port on the network. In the case of IPsec, for example, you would see encapsulating [...]

What We’re Reading, Week of 1/2

Posted: 6th January 2012 by VPN Haus in Highlights
Tags: , , ,

Help Net Security, Securing Android for the Enterprise Infosec Island, How to Re-Awaken Your Inner Hacker InfoWorld, New year, same old security passwords eWeek, Enterprises Need Encryption to Secure Private Data Share this:EmailFacebookPrint