Product Review: Zone Alarm Force Field Zone Alarm has been a virtual household name in consumer computer security. The Zone Alarm firewall, especially the version available for free for personal use, has been protecting computer systems for years. Now owned by Checkpoint, a well-known source of enterprise firewall and security...read more | | Serious Vulnerability Found in PDF Files Adobe created the PDF, or Portable Document Format, to be interoperable among various operating systems and platforms. They wanted to provide a format which could be embedded in web pages or shared among users who may have different software on their systems. In recent years, as the macro functionality of the popular Microsoft Office programs, such as the Word DOC files, or the Excel XLS files, has been exploited for malicious purposes, many organizations have come to rely on the PDF file...read more | Security Issues Persist at TJX Still recovering from the largest data security breach to date, and working to resolve law suits with consumers, TJX still has security issues. They claim in their Important Customer Alert, that "We remain committed to providing our customers a safe shopping environment as you shop for great values, fashion and brands. TJX has been working diligently with some of the world's best computer security firms...read more | Sponsored Links | | |
What Is VoIP Phishing? | | What Is VoIP Phishing and How Does It Work? Phishing is a type of attack that lures the user into giving personal information like passwords and credit card numbers over a website or phone. Phishing over VoIP is becoming rampant as VoIP makes phishing easier for attackers. In this article, VoIP Guide Nadeem Unuth discusses what phishing is and how it works, and also how VoIP makes it easier. | Cholesterol Resources | | Cholesterol Resources Are you concerned about high cholesterol? From heart-healthy diets to alternative therapies, find the information you need to be healthy. Learn more
| | Advertisement
|
No comments:
Post a Comment