Friday, 18 September 2009

new internet security product 5 star rating

THREATFIRE

threatfire is the new internet personal security suite on the market

we have tested this product and find it to be both easy to use and a powerfull

anti-virus , and spyware programm

highly recommended

Saturday, 16 May 2009

SHARES OF INTERNET SECURITY SOFTWARE MAKER PLUMMET

Shares of WatchGuard Technologies fell 32 percent after the maker of Internet-security software and hardware said that it would have a wider-than-expected loss this quarter as sales miss forecasts. Shares of the company, based in Seattle, fell $3.24 to $6.95. They have declined 78 percent this year. The company said it expected a loss of 23 cents to 29 cents a share this quarter. It was projected to have a loss of 4 cents, according to analysts surveyed by Thomson Financial/First Call. The company attributed the drop in sales to the weak economy and less demand for its more expensive products.

Tuesday, 31 March 2009

IBM in Washington DC with a law firm accusing Big Blue and an unknown employee of hacking into it and its clients’ email.

A remarkable case has started against IBM in Washington DC with a law firm accusing Big Blue and an unknown employee of hacking into it and its clients’ email. Butera & Andrews is a law firm based in DC, and the case is being brought under the Computer Fraud and Abuse Act, the Stored Communications Act and the Electronic Communication Privacy Act. The firm said in its allegation that an employee suspected last October or November that the email server, contracted out to Virginian firm Sierra Corporation, had been compromised.

Friday, 27 March 2009

Open source software security vulnerabilities

Security vulnerabilities in open source could mean that companies are opening their doors to viruses, software exploits and other problems that could adversely affect their businesses, users and customers, says the company.

It cites security expert John Viega: “The very things that can make open source programs secure – the availability of the source code, and the fact that large numbers of users are available to look for and fix security holes – can also lull people into a false sense of security.”

Rob Rachwald, director of product marketing at Fortify, says that in fact, the Open Source Vulnerability Database in 2006 showed more than 8,500 vulnerabilities. And the problem, he suggests, is that many open source communities do not utilise security experts, meaning that their security processes tend to be inadequate.

“Are these sufficient reasons to totally avoid open source software,” he asks? “No: the merits of open source usually outweigh the downsides, but the enterprise that blindly opens its doors to open source software without fully judging the security challenges is asking for trouble

Wednesday, 25 February 2009

BCS Consultancy event Cybercrime Forensics

Date/Time:
Wednesday 4th March 2009, 6.00pm for 6.15pm (ends 9.30pm).

Venue:
BCS London Office, First Floor, The Davidson Building, 5 Southampton Street, London WC2E 7HA.

Speakers:

Peter Wood, Chief of Operations, First Base Technologies
Denis Edgar-Nevill, Head of the Department of Computing at Canterbury Christ Church University

PART 1

The new blended attack is social engineering plus technology. Criminal hacking is no longer a purely technical activity. Today organised crime uses every combination of technical, physical and human attacks to achieve its goals. Unless organisations understand how defend against attack on every front they will be hacked.

The approach of purchasing individual "silver bullet" solutions like firewalls, IDS and IPS must be replaced by an holistic view of security embracing technology, people and physical controls. Staff awareness of social engineering is particularly weak, leaving most organisations open to abuse both remotely and in person. Physical hacks such as key loggers and web cams are increasing, yet most organisations have no way to detect them. This presentation will open your mind to these new, blended attacks and offer ideas for defending against them.

PART 2
Part 2
Title: Cybercrime Forensics: Bringing together New Stakeholders to Tackle Computer Crime
Speaker: Denis Edgar-Nevill

Summary:

The problem of cybercrime has the potential to effect a greater number of people on Earth than any other form of criminal activity. The presentation will look at how Cybercrime Forensics has grown up as a new discipline bringing together specialists in police and law enforcement, computing, computer security, law, forensics, software/hardware development and business.

The British Computer Society has recognized its growth with the creation of the new national BCS Cybercrime Forensics SG which held its inaugural meeting in December 2008. The presentation will looking at the groups planned activities and how it can to bring together stakeholders to make a positive contribution addressing computer crime.

TO BOOK A TICKET FOR THE EVENT AT ONLY £17.00! CLICK ON THE LINK CYBERCRIME EVENT

M.Francis UK TASKFORCE

Friday, 20 February 2009

19-02-2009
just tested:

this new network security software from emailalarms:Corporate Network Security 2.5

It will Protect PC workstations over your network with Corporate Network Security. This network-based password-protected security software lets you impose access restrictions to all your PC workstations you have in your corporate network to stop users from tampering with them.

Also, it allows you to apply executable patches to your workstations remotely, and schedule reboots, shutdowns, and Windows Explorer restarts.

The workstations are controlled from a single administrator's computer from almost everywhere where you have access to the TCP/IP-based network or Internet.

Using Corporate Network Security you can do the following to your PC workstations: deny access to each individual component of several Control Panel applets,
including Display,
Network, Passwords,
Printers, System and Internet Options;
disable the boot keys,
context menus,
DOS windows,
Registry editing,
Internet and Network access;

hide desktop icons,
individual drives, Start menu items, and taskbar;
apply password protection to Windows and restrict users to running specific applications only,

Control Internet Usage and much more. In total, Corporate Network Security supports over 600 different security restrictions, options and tweaks that allow you to restrict access to almost every corner of Windows.

Free trial download from:

Corporate Network Security 2.5

best regards to all

Computer forensic Service

Wednesday, 4 February 2009

SPY + COMPUTER SPY SOFTWARE

Hi
i have just run tests on the new SPY+ Computer Spy software
and have to report how comprehensive i found it to be
------------
i first installed it in my own laptop , it took only seconds!
the interface is very user friendly and can allow the user to tweak its reporting
from 10 seconds to every hour
-------------
powerfull is an understatement when talking about this software
everything from colour screenshot, to login passwords is recorded
it will even send reports to your email address if you so wish
-------------
using 3 key stroke to enter and covert button to hide it could not be easier to use
-------------
and at a one off price not many can beat
oh yes and you are not limited to 1 machine it can be installed on as many as you wish...how about that! in this day and age when and software never mind spy software
is usually restricted to one licence only SPY+ software is a real rarity
here in the UK it is only available by download from
SURVEILLANCE ZONE One of the best spy equipment sites i've found.

Sunday, 1 February 2009

newtork security budgets increasing worldwide

Compliance, data leakage and privacy issues, along with the need to tackle the fast evolving and sophisticated threat environment, are among the major drivers fuelling the growth of spending on security.

Cisco said that one of the main drivers behind the increase is financial losses from attacks on corporate networks and employees, including those who work outside the office.

The study suggests that risky behaviour from remote workers, such as opening suspicious emails, hijacking wireless networks or sharing corporate devices with non-employees, is much more extensive in China, India and Brazil than in nations with a longer history of corporate internet use.

SECURITY SOFTWARE REVIEW

Welcome to Security software review

on these pages i will endeavour to offer you a straightforward explanation of internet security software and computer security sofwtare together with thier strengths and weaknesses.

Firstly Newtork Security software protects corporate intranet and internet networks ( including wireless networks ) from malicious attacks from outside the nework itself
i.e. from hackers.

The systems work very well up to a point in that they will discourage the hobbyist hacker but they will not deter a criminal attackers who may be after lucrative information, such as credit card numbers , card payment packets, bank account details of staff e.t.c.

Some of the best network security software packages even attempt to hack the hackers system and also log i.p. addresses McAfee anti virus software Total protection 2009
actively blocks all these attacks and gives a thorough report to the user.

For user friendly platform combined with true security performance it cannot be beaten