Friday, September 28, 2007

About Net Security: September 28, 2007

About.com   Net Security
In the Spotlight | More Topics | VoIP Phishing |
  from Tony Bradley, CISSP-ISSAP
The Web is an exceptionally useful tool. People use it for research, socializing, shopping, sharing, and more. It should come as no surprise that the more applications and services there are running on the Web, the more vulnerabilities and security issues you will encounter. This week I reviewed a new tool from Zone Alarm, Force Field, which is designed to protect you while you surf the Web. It seems like more people may need such protection too in light of vulnerabilities discovered with various Google services and a flaw on the TJX web site. Check out the links below for more details.

 
In the Spotlight
Product Review: Zone Alarm Force Field
Zone Alarm has been a virtual household name in consumer computer security. The Zone Alarm firewall, especially the version available for free for personal use, has been protecting computer systems for years. Now owned by Checkpoint, a well-known source of enterprise firewall and security...read more

 
         More Topics
Serious Vulnerability Found in PDF Files
Adobe created the PDF, or Portable Document Format, to be interoperable among various operating systems and platforms. They wanted to provide a format which could be embedded in web pages or shared among users who may have different software on their systems. In recent years, as the macro functionality of the popular Microsoft Office programs, such as the Word DOC files, or the Excel XLS files, has been exploited for malicious purposes, many organizations have come to rely on the PDF file...read more

 
Security Issues Persist at TJX
Still recovering from the largest data security breach to date, and working to resolve law suits with consumers, TJX still has security issues. They claim in their Important Customer Alert, that "We remain committed to providing our customers a safe shopping environment as you shop for great values, fashion and brands. TJX has been working diligently with some of the world's best computer security firms...read more

 
 
Sponsored Links
 
What Is VoIP Phishing?
What Is VoIP Phishing and How Does It Work?
Phishing is a type of attack that lures the user into giving personal information like passwords and credit card numbers over a website or phone. Phishing over VoIP is becoming rampant as VoIP makes phishing easier for attackers. In this article, VoIP Guide Nadeem Unuth discusses what phishing is and how it works, and also how VoIP makes it easier.
 
Cholesterol Resources
Cholesterol Resources
Are you concerned about high cholesterol? From heart-healthy diets to alternative therapies, find the information you need to be healthy. Learn more

Advertisement
 
 
Visit Related About GuideSites:
Wireless / Networking Antivirus Software Focus on Windows
Email internet  
Search About  

 
More Newsletters: To sign up for more free newsletters on What You Need to Know About your favorite topics, visit: http://talk.about.com

You are receiving this newsletter because you subscribed to the About Net Security newsletter as security.world@GMAIL.COM. If you wish to change or remove your email address, please visit:
http://www.about.com/nl/usgs.htm?nl=netsecurity&e=security.world@GMAIL.COM

About respects your privacy. Our Privacy Policy.

Our Contact Information.
249 West 17th Street
New York, NY, 10011

© 2007 About, Inc.

No comments:

Post a Comment