vulnerability

Review: AZScan

Review: AZScan

AZScan has a way to go to become a world-class vulnerability assessment tool – the product is not intuitive. First, one needs to know quite a bit about the product being audited. Second, there is no online help or tool tips. Third, the menu choices don’t always behave as expected. Set-up seems easy at first, but details often don’t work.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: BindView Control Compliance Suite

Review: BindView Control Compliance Suite

The BindView Compliance Control Suite includes bv-Control for Windows, bv-Control for Internet Security and Compliance Center. This is a very complex suite of products and is part of a complete compliance and assessment toolkit that offers virtually every view necessary of the security compliance status of an enterprise. This very strength makes configuration and use of the product difficult at first.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: Core Impact

Review: Core Impact

Core Impact is different in that while it performs vulnerability assessment, it is primarily a penetration testing tool. It behaves like a hacker, performing vulnerability and port scans then attempting to penetrate the target using the vulnerabilities it finds. There are real benefits to this approach.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: GFI LANGuard Network Security Scanner

Review: GFI LANGuard Network Security Scanner

This is a straightforward vulnerability scanner that also manages patch deployment. It can push patches and service packs out to target computers by means of a patch agent installed on the target. We found it generally competent and straightforward to install on our Windows 2000 notebook.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: Nessus/NeWT

Review: Nessus/NeWT

Nessus has been a mainstay of vulnerability scanning since the Nessus Project was started by Renaud Deraison in 1998. The Nessus website claims that over 75,000 organizations worldwide use the program.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: NeXpose

Review: NeXpose

As an appliance, NeXpose fits into our category of fully featured products, but it is also available as software only. Uniquely, Rapid 7 also offers a managed service for organizations with limited resources.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: SAINT Scanner

Review: SAINT Scanner

Saint is a venerable product with its roots in the earliest days of automated vulnerability assessment. It has been dressed up in a new suit of clothes since becoming a commercial product, but retains its strong Unix roots.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Sophos report fingers top spam relaying nations

Sophos report fingers top spam relaying nations

The US continues to be the leading nation when it comes to relaying spam around the world, according to a security firm.
Staff Writers Jan 25 2006 10:15AM Security
Vulnerability is our business

Vulnerability is our business

It might seem like a cosy, family-run business, but as David Quainton discovers, Next Generation Software has earned a global reputation
David Quainton Oct 21 2005 3:27PM Security
Developing a patch and vulnerability management strategy

Developing a patch and vulnerability management strategy

In the first two quarters of 2005 more than 3,780 software vulnerabilities were reported, leaving a wide range of system components and software open to exploits. With the popular operating systems often the key target of worm and virus writers, the majority of businesses are left open to attacks.
Alan Bentley Oct 20 2005 11:03AM Security
Australia drops off 'Dirty Dozen' spammers list

Australia drops off 'Dirty Dozen' spammers list

Australia did not rank in the top 12 spam relaying countries in the past six months, according to the latest report from security firm Sophos.
Vivienne Fisher Oct 13 2005 4:13PM Security
Financial spam tops list in August

Financial spam tops list in August

Financial spam topped the list of most prevalent spam during August, according to a report from Trend Micro.
Vivienne Fisher Sep 14 2005 9:41AM Security
How not to get hacked: Microsoft

How not to get hacked: Microsoft

Microsoft pushed security to the front of its Tech.Ed agenda on the Gold Coast this week, holding a developer and technical support session aimed explaining the easiest routes to hack attack on any IT network.
Fleur Doidge Sep 1 2005 3:18PM Security
Windows vulnerability sparks viral warfare

Windows vulnerability sparks viral warfare

The Zotob worm and its Windows hitting counterpart, Ircbot, are waged in viral warfare. Ircbots and a similar virus group known as Bozori are actively deleting Zotob viruses, the first to attack a newly announced Windows vulnerability.
David Quainton Aug 18 2005 10:38AM Security
NIST unveils new vulnerability database

NIST unveils new vulnerability database

The National Institute of Standards and Technology (NIST) has launched a new vulnerability database that integrates all publicly available federal vulnerability resources and provides links to industry resources.
Marcia Savage Aug 15 2005 5:55PM Security
Netsky remains on the radar

Netsky remains on the radar

Netsky-P took out the number one spot for viruses causing problems for businesses during July, according to a security firm.
Vivienne Fisher Aug 3 2005 10:03AM Telco/ISP
Viruses on the increase: report

Viruses on the increase: report

The time it takes for a PC to get infected by an internet worm is dropping, according to a security firm.
Staff Writers Jul 5 2005 11:02AM Security
Alluring images hoodwink users

Alluring images hoodwink users

People are being lured into opening worm-carrying emails by subject lines referring to alluring pictures.
Vivienne Fisher May 30 2005 4:19PM Security
RSA patches major vulnerability

RSA patches major vulnerability

RSA has issued an unexpected patch to plug a hole in its web application tool.
David Quainton May 12 2005 11:39AM Security
Bots increase in April

Bots increase in April

Bots accounted for 35 percent of all malicious code detected in April, an increase of 14 percent from March figures according to security vendor Fortinet
Staff Writers May 9 2005 2:30PM Security

Log In

  |  Forgot your password?