Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

P2P File Sharing Policy

Tech Pro Research's P2P File Sharing Policy can help you provide guidelines for the proper use of P2P file sharing.You can download the policy template and use it as is or modify it to suit your needs.The...

from Tech Pro Research

A world without Wikipedia

Jimmy Wales jumped on the "screw SOPA" bandwagon this week and led Wikipedia into a 24-hour blackout to protest, causing panic, confusion and general hysteria among the knowledge-seeking population. But ask yourself this: what if Wikipedia never came back online?

January 19, 2012 by in Government

Metadata key to video industry: Adobe

Although video is beginning to take up a large portion of traffic on the internet, search engines aren't yet at the stage where they can completely index and understand the content. ZDNet Australia speaks to Adobe on how to overcome these issues using metadata.

November 17, 2011 by in Security

Nokia 6230i

Nokia 6230i

Nokia's 6230i is an upgraded version of its classic, unpretentious 6230 with a higher quality screen, 1.3-megapixel camera and Bluetooth.

July 11, 2005 by in Microsoft

Samsung D500

Samsung D500

Samsung's latest slider phone, the D500, looks a lot like its sliding predecessor, but comes in a black case with a megapixel camera and an MP3 player.

April 25, 2005 by in Samsung

F5 FirePass 4100

F5 FirePass 4100

This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.

February 28, 2005 by in Security

Webroot Spysweeper

Webroot Spysweeper

If you're unsure about the applications installed on your PC -- or know for a fact you've got a few bits of shady software hanging around -- then Spysweeper is a good buy, once you get past the speed issues.

February 22, 2005 by in Security

Check Point InterSpect 610

Check Point InterSpect 610

Although it's beyond the means of most small businesses, InterSpect is worth consideration by larger enterprises concerned about growing internal threats to their networks.

January 10, 2005 by in Security

IronPort C60

IronPort C60

This is an impressive big-company email security solution with top-name antivirus and anti-spam tools. But this market is very crowded, and alternatives do more for less.

November 19, 2004 by in Security

Motorola E398

Motorola E398

Motorola's music mobile combines a full-featured handset that will appeal to a wide range of users whether they're looking for fun, functionality or the perfect mixture of both.

November 15, 2004 by in Mobility

GhostSurf 2005 Platinum

GhostSurf 2005 Platinum

Want to remain anonymous while you surf? Check out Tenebril's GhostSurf, which encrypts your Internet connection and provides some useful security-related utilities into the bargain.

October 8, 2004 by in Security

Most Popular