contact contact contact
 Advertise
 Contact
 SecurityWatch
  Articles | Editorials | Reviews | News | InfoSec Directory | Releases | White Papers

VoIP Articles - New to VoIP? VoIP Articles will help you understand what's important in VoIP.

InfoSec Directory

If you are searching for Network Security, look no further than the InfoSec Directory on IT-Observer, where you will find the latest whitepapers and articles on Network Security.

Network Security   Wireless   Encryption  

5 Most Recent Articles

Passive Visual Fingerprinting of Network Attack Tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attackers as well as the identifiable characteristics of the tools themselves.

Added: Friday, 24 June 2005
How Secure are current mobile operating systems
Mobile devices are becoming ever more capable and are able to open up a broader range of applications in professional environments due to their increasing functionalities. Personal Digital Assistants (PDAs) and Smartphones allow users to access sensitive personal data at any time and any place, making it possible to increase productivity.

Added: Friday, 24 June 2005
Setting Up And Using Bluetooth Hardware With Development Tools
The purpose of this document is to describe how to set up the Bluetooth testing environment for the C++ emulators of Software Development Kits (SDK), such as the Series 60 SDK 2.1 and the Series 80 Developer Platform 2.0 SDK. Software and hardware requirements are included, as well as a description of the major differences between the testing environment and the real-world device environment, which must be taken into consideration when testing Bluetooth applications.

Added: Friday, 24 June 2005
The Battle Against Phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misguide) users.

Added: Friday, 27 May 2005
Toward SSL Integration in SIM SmartCards
The convergence between wired and wireless communications networks has led to define architectures integrating both networks. For that, there has been extensive standardization and development of new generation mobile systems, especially GSM and GPRS.

Added: Friday, 27 May 2005
Saturday, November 26, 2005

Network Security

· How Your ISP Protects You?
· Analyzing Worms using Compression
· Security: Forget the Sheep, Mind the Bears!
· CIOs nervous about IP network security


Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Network Security Software - Sponsored by GFI Network Security.

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!


Wireless Security

· Secured Wireless Offers Enterprises More Than Just Peace Of Mind
· Wireless LANs, the new 'secure' network
· WPA-PSK: Step-by-Step
· 10 ways to wireless security

Press Releases

· Senior IT Security Professionals Make It Personal And Take A Step Back From Compliance
· Acunetix Web Vulnerability Scanner Version 3.0 Combats Rise in “Google Hacking” Attacks
· SANS Top 20 List overlooks the people, legal and insurance issues
· "Laws of Vulnerabilities" Research shows progress but reveals two out of three systems still vulnerable
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter