Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
Zero Day Attack
Malicious software code that exploits a software vulnerability which hasn't yet been repaired by the manufacturer or recognised by anti-virus software is called a zero day attack. This kind of attack is particularly dangerous because until it has been detected, end users can become victims of the malicious code even whilst running anti-virus software and having the latest patches. The worlds most often attacked software manufacturer, Microsoft, releases security updates to all its products once a month on what has become known as Patch Tuesday. Some believe that this cycle is too short, potentially leaving some zero day vulnerabilities unpatched for as long as a month. In practice however, 3rd party security companies usually beat Microsoft to protecting against these vulnerabilities.
BIOS verification and APT for Dell Computers
Dell increases security on computer range with the inclusion of advanced threat protection technology and BIOS verification
Report on targeted attack detection
Trusteer comments on the methods of detecting targeted attacks and the state of readiness of IT professionals to deal with advanced threats
Advanced Persistent Threat protection partnership
Threat management and protection platforms from NetCitadel and FireEye integrated for improved protection against zero day attacks and advanced persistent threats
Packet inspection no longer sufficient to overcome cyber attacks
Sans Institute member comments on the need to move on from packet inspection as networks become faster and harder to secure
Smartphone Security Timebomb Continues Ticking
Trusteer explains why hackers are two steps ahead of the mobile security industry and are ready to exploit vulnerabilities on Android and iOS devices when they become more widely used for on-line mobile banking applications
Middle East Telecoms Company Protects Networks with IPS from TippingPoint
Intrusion Prevention Sensors on the networks at Oman Telecommunications provide protection from Malware, Viruses and Intrusion attempts
CounterStorm protects from targeted and zero day attacks
Trusted Computer Solutions launches CounterStorm for the rapid and accurate detection of zero day threats
UTM explained by Wick Hill
Ian Kilpatrick of Wick Hill provides some insight into Unified Threat Management and why they can offer more than simple firewall protection
When the horse bolts how do you close the stable door?
Piers Wilson points out that security is a risk management discipline that means in practice any level of defence is only ‘partial': there is always an element of residual risk.
CNET award for Comodo Firewall Pro.
Comodo's firewall product continues to rake in the awards with CNET being the latest to recognise the innovative protection offered by Firewall Pro.
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   Â© 2012 ProSecurityZone.com
Netgains Logo