detection

Group finalizes spyware detection guidelines

Group finalizes spyware detection guidelines

The Anti-Spyware Coalition (ASC), which counts AOL, McAfee, Microsoft, Symantec and Yahoo among its members, this week released the final working report of a risk-model description that helps provide transparency in how anti-spyware companies evaluate software applications.
Jan 17 2006 9:45AM
Virus detection new to GMail

Virus detection new to GMail

GMail, Google's email service, has added virus scanning to its list of features.
Dec 6 2005 2:55PM
Symantec patents quicker virus detection

Symantec patents quicker virus detection

Symantec has won a patent from the U.S. Patent and Trademark Office for technology that streamlines virus detection.
Mar 2 2005 4:40PM
Zen and the art of intrusion detection

Zen and the art of intrusion detection

If a tree falls in a forest with no-one to hear it, does it make a sound? So goes a typical zen-like philosophical question. While it’s thought-provoking, what does it have to do with Intrusion Detection Systems (IDS)?
Feb 17 2005 10:02AM
From detection to prevention

From detection to prevention

2005 may be the year of the IPS tools, but not before they address persistent problems, says Andre Yee
Dec 1 2004 3:19PM
Why should anti-virus products employ heuristic detection?

Why should anti-virus products employ heuristic detection?

Once upon a time, in a galaxy not so far away, there were only a few computer viruses. Little more than a curiosity to most, they were relatively rare, slow spreading and in general, more of a mythological threat than a real one. The initial anti-virus products that were created to deal with these were perfectly adequate; updated once a month or so, the customers could be fairly sure that they would be protected. Fast-forward to today’s interconnected and always-on world, and the scale of the problem is orders of magnitude above where it was back in those early days.
Nov 24 2004 2:47PM
Network Intrusion Detection 3rd edition

Network Intrusion Detection 3rd edition

The next incarnation of the excellent network intrusion detection manual from SANS's Stephen Northcutt and Judy Novak is here.
Jan 15 2004 12:28PM
Monitoring Security from the Inside Out: Intrusion Detection at the Configuration Level

Monitoring Security from the Inside Out: Intrusion Detection at the Configuration Level

Today’s intrusion detection (ID) technology is, for the most part, network-centric.
Jan 15 2004 11:45AM
Intrusion Detection: Let’s Make Some Real Progress, Today!

Intrusion Detection: Let’s Make Some Real Progress, Today!

It would be nice if most intrusions were detected, but they are not.
Jan 15 2004 11:26AM
Signature-Based or Anomaly-Based Intrusion Detection: The Practice and Pitfalls

Signature-Based or Anomaly-Based Intrusion Detection: The Practice and Pitfalls

Intrusion detection has become big business on the Internet and, to be honest, it's not surprising.
Jan 14 2004 1:23PM
Intrusion Prevention and Detection: Are They Just Missing the Point?

Intrusion Prevention and Detection: Are They Just Missing the Point?

Organizations know they must protect themselves from the mysterious enemy that is a ‘hacker’ and viruses such as LoveLetter, but often there is a misguided belief that these external threats are the main risks to businesses.
Jan 9 2004 3:59PM
Review: eTrust Intrusion Detection

Review: eTrust Intrusion Detection

This solution provides a network-based IDS, real-time session monitoring and internet/email content blocking. eTrust Intrusion Detection can be installed in standalone mode, or it can be distributed on separate machines. The intrusion detection program installs as a service under Windows NT/2000. As usual, the monitoring interface is a NIC in promiscuous mode, and therefore the presence of the IDS is concealed from the attacker.

Apr 1 2003 12:00AM

Log In

Username / Email:
Password:
  |  Forgot your password?