Eccuni 
Showing profile of Eccuni. Subscribe to author's feed to follow recent articles!
Eccuni has 31 articles and online since 01.06.2011.
Profile not updated yet!
Profile not updated yet!
Showing 31 articles of Eccuni. Results between 20 and 40.
The New Wave of Crime, the Car hacking
Published on December 14th 2011 | Internet
Published on December 14th 2011 | Internet
The cars nowadays have become more inclined to connectivity and have gained further access to the Internet. However, because of this innovation, cars are now open to car hacking....
Stopping Breaches with Agile Security
Published on December 13th 2011 | Internet
Published on December 13th 2011 | Internet
Security is important in every company network, but traditional tools are being left behind in the dust. Thus, it is important to stop breaches with the adaptable, agile security....
The Mac Malware is Back
Published on December 12th 2011 | Internet
Published on December 12th 2011 | Internet
Having a malware on any Windows computer is a huge predicament. But lately, Mac users are slowly suffering the same predicament because of the return of Mac malware....
The Power of Knowledge Against Hackers
Published on December 8th 2011 | Internet
Published on December 8th 2011 | Internet
Hackers are always determined about their goals, which is to deliver terror inside the hearts of company networks. And that is the reason why, companies must be prepared against such threats and colle...
Incoming Waves of Small Botnets
Published on December 7th 2011 | Computer
Published on December 7th 2011 | Computer
Indeed, botnets are a huge pain in the neck to many industries, law enforcement agencies and cyber security experts. But because of their stiff concerns against these problems, criminals have found ne...
The New Breed of Firewalls
Published on December 2nd 2011 | Internet
Published on December 2nd 2011 | Internet
Newer threats are roaming the threat all the time and firewalls are our first line of defenses against them. Regular firewalls may do only half the job but knowing more about the NGFWs we can better u...
The Dangers of Man-in-the-Middle in Voting Machines
Published on December 1st 2011 | Internet
Published on December 1st 2011 | Internet
The Election Day is fast approaching in every state in the country. Security experts and researchers from Vulnerability Assessment Team or VAT at Argonne National Laboratories made a video that demons...
Protecting Business Networks by Using Network Segmentation
Published on November 30th 2011 | Internet
Published on November 30th 2011 | Internet
Nowadays, technology has driven business networks to change, evolve and adapt. However, the security has not evolved together with networks and that is the reason why businesses must protect their net...
It's a Matter of Privacy
Published on November 29th 2011 | Internet
Published on November 29th 2011 | Internet
Everyday people make compromises to their privacy and some of us do not have as much privacy as we really want....
Virtualization - Specific Security the Elixir of VM Stall
Published on November 28th 2011 | Internet
Published on November 28th 2011 | Internet
VM stall is among the issues organizations will face whenever they promote virtualizations within their organizations. Somehow this problem isn't a difficult dilemma to solve if they have the solution...
Kaspersky's New Security Software for Businesses
Published on November 25th 2011 | Internet
Published on November 25th 2011 | Internet
Kaspersky Lab has recently released its most potent AV software that is created for the purpose of protecting the network systems of businesses. It is the Kaspersky Endpoint Security 8 for Windows-ope...

Authors 