Tim Greene

Articles by Tim Greene

10 cutting edge snooping gadgets

Data thieves rely on an ever growing cache of high-tech surveillance weaponry to extract valuable information from their victims. Here are 10 illegal and legal ways cyber crooks tap into networks and computers to capture data and conversations

SSL VPN hack vulnerability details to emerge

At the Black Hat conference, researchers plan to demonstrate a weakness in domain validation using secure sockets layer Web sessions, allowing hackers to get passwords. This is especially true in open Wi-Fi networks

Using electrical outlets and cheap laser pointers to steal data

Theives can lift precious data from computers by simply tapping into an electrical outlet or using a laser pointer that senses keyboard vibrations. Security experts speaking at Black Hat USA 2009 tell howrn

IBM software to ease multivendor security

Endpoint security manager will allow organizations to use best of breed solutions supervised under one window

Open source PBXs gain popularity: survey

An Eastern Management Group survey found Asterisk and other open source telephony software beat out Nortel, when measured by the number of lines installed. Why an Infonetics analyst is skeptical

Secure Passage intros firewall analysis tool

FireMon software is designed to analyze firewall policies for different zones of traffic and identify unintended effects. Find out what it displays

Citrix upgrades XenDesktop, Branch Repeater

HDX is designed to compress data streams between servers and end points. Find out about the adaptive orchestration feature

Blue Coat advances integration with Packeteer gear

The application acceleration vendor is upgrading its software to allow traffic shaping products to share information about data flows and application performance.

Tech News