je.st
news
Tag: attacks
EvilAP Defender - Detect Evil Twin Attacks
2015-04-18 13:46:56| Wireless - Topix.net
EvilAP_Defender is an application that helps wireless network administrators to discover and prevent Evil Access Points from attacking wireless users. The application can be run in regular intervals to protect your wireless network and detect Evil Twin attacks.
Tags: evil
twin
attacks
detect
Can toilet paper be a luxury product? Solaris attacks $1.4b oligopoly
2015-04-17 18:39:51| Grocery - Topix.net
Can toilet paper be a luxury product? The new chief executive of Solaris Paper, which is owned by Indonesian giant Asia Pulp & Paper, hopes so. Terry Hughes is preparing for a fresh assault on the $1.4 billion oligopoly in Australia's toilet paper and facial tissue market with the Emporia range, which will be the most expensive on the shelves of Woolworths and Coles.
Tags: product
paper
luxury
attacks
User mistakes aid most cyber attacks, Verizon and Symantec studies show
2015-04-14 09:07:30| IT Services - Topix.net
When a cyber security breach hits the news, those most closely involved often have incentive to play up the sophistication of the attack. If hackers are portrayed as well-funded geniuses, victims look less vulnerable, security firms can flog their products and services, and government officials can push for tougher regulation or seek more money for cyber defenses.
User mistakes aid most cyber attacks, studies show
2015-04-14 09:07:29| IT Services - Topix.net
When a cyber security breach hits the news, those most closely involved often have incentive to play up the sophistication of the attack. If hackers are portrayed as well-funded geniuses, victims look less vulnerable, security firms can flog their products and services, and government officials can push for tougher regulation or seek more money for cyber defenses.
User mistakes aid most cyber attacks, Verizon and Symantec studies show
2015-04-14 08:47:21| Telecom - Topix.net
When a cyber security breach hits the news, those most closely involved often have incentive to play up the sophistication of the attack. If hackers are portrayed as well-funded geniuses, victims look less vulnerable, security firms can flog their products and services, and government officials can push for tougher regulation or seek more money for cyber defenses.
Sites : [54] [55] [56] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] [68] [69] [70] [71] [72] [73] next »