CEH – Certified Ethical Hacker v. 6 Training Hands-on: Hacking WEP Encryption

Like Us on Facebook for Product Releases and Specials! http://www.facebook.com/CareerAcademyTraining CareerAcademy.com http://www.CareerAcademy.com is excited to announce the release of a new free video webcast on CEH – Certified Ethical Hacker v. 6 Training Hands-on: Hacking WEP Encryption. This free video webcast is led by one of the expert instructors featured Continue Reading

Windows 7 – Security Features

Whats New with Windows 7’s security features? Well let me tell you that you still need an AntiVirus software installed but thats nothing new. Watch the video for details. Click here http://PCWizKidsTechTalk.com for more Windows 7 tips. source

Three ways Mac users can get infected by the OSX/RSPlug Trojan horse

This video describes how Mac users can get infected by the OSX/RSPlug – DNSchanger Trojan horse. For more information about this trojan threat, visit our company blog : http://blog.intego.com/2009/07/02/new-variant-of-the-rsplug-trojan-horse/ http://blog.intego.com/2009/06/24/hacking-twitter-to-spread-mac-malware/ http://blog.intego.com/2009/06/19/new-rsplug-trojan-horse-variant-found-on-game-sites/ http://blog.intego.com/2009/06/16/whats-in-a-name-new-trojan-is-variant-of-old-trojan/ http://www.intego.com/news/ism0705.asp source

VoIP Security Roundtable (1 of 5)

VoIP Security Roundtable with Bob Bradley (Product Line Manager of Sonus Networks), Ken Kuenzel (Founder and CTO at Covergence), James Taylor (Director Sustaining Engineering of Global Crossing) and Stephane Teral (Principal Analyst at Infonetics Research.) (c) 2008 Stealth Communications. Recorded at Voice Peering Forum (voicepeeringforum.com.) Part 1 of 5 source