|
 |
Computer Forensics Training in December
A must for security and network administrators, law enforcement officers and fraud investigators - advanced training courses in computer forensics. Learn about effective Windows-based investigation, including analysing and recovering Microsoft Registry artifacts. Click here to find out more |
|
|
|
Trojan hijacks browser, sends user to porn site Unwary surfers infected by a new trojan horse may be in for a shock when their browser is unexpectedly redirected to a hardcore porn site, a security firm has warned. More...
IDC sees bright future for IT services Companies and governments will spend US$553 billion on external IT services on a worldwide basis this year, even as the services industry works to redefine itself, IDC said in a report released this week. More...
Group demands cameraphone vendors prevent invasion of privacy A British privacy advocacy group this week called on mobile phone makers to take steps to prevent the use of cameraphones to invade privacy. More...
Watch out for holiday spam and scams: FrontBridge FrontBridge Technologies' spam and virus analysts are forecasting a rise in email spam and phishing scams during the coming holiday season. More...
Enron email study shows liability nightmare A study of millions of Enron email messages found scores of messages with content that posed all kinds of potential liability risks. More...
Conectiva, Mandrakesoft, Turbolinux, Progeny form core Linux group Four Linux vendors have joined together to develop technology that would potentially make it easier for software makers to build products for multiple distributions of the open-source operating system. More...
|