While Shodan isn't exactly "the scariest search engine on the Internet," it does present some security risks. Here is how to minimize them.
Mac OS X has developed a reputation for security – which means many people ignore measures they should take to secure Macs in the enterprise.
A U.S. software programmer made headlines when he outsourced his own job to China. He probably never would have gotten away with it if his employer had been paying attention to its log files.
A confusing collection of cloud security standards can make it tough to evaluate cloud provider security.
Mobile device management can help enterprises deal with BYOD. But there are other ways of minimizing BYOD risks as well.
Avoiding hacks is perhaps the most essential responsibility for security organizations, which can learn some valuable lessons from this analysis of a real-life hack.
Former CIA Director General David Petraeus and paramour Paula Broadwell could have made good use of three strategies for keeping private email exchanges private.
What do three of the five most common website attacks have in common? Yes, a lack of input sanitization. Find out why it's important and what to do about it.
Hackers love to target users' website passwords. Companies can thwart them by using multiple methods designed to make hacking as costly and time consuming as possible.
RFI inclusion is a simple website attack that nonetheless can make sites vulnerable to data loss or other malice. Using careful code logic will thwart RFI attacks.
Input sanitization is key to defending against XSS attacks. Is your company's website secured?
Your company's web site does not have to be the next victim of a SQL injection breach. Here's how to protect against attack.
A Denial of Service attack can disrupt your organization's web site and network services. Here's how to defend yourself.
Upgrading old software is often a painful and costly process. But deferring those upgrades could be potentially catastrophic for your business.
WordPress is a popular target for hackers, but there are steps you can take to make your installation more secure.
The same tools that can be used as weapons by some can be used for self-defense to protect your online activity from malice.
HTML5 promises to make advanced Web app features available in native HTML, but also brings with it potential security vulnerabilities.
S/MIME support is already built into most desktop email clients, including Outlook, Apple Mail, and Thunderbird. Learn how to use it to encrypt your personal or business email messages.
Protect your business and personal email accounts by practicing these four key steps to email security.
Using PC virtualization can add a layer of defense against malware and other types of security compromises to your desktop.
Conventional wisdom still treats passwords like a first line of defense when, in fact, in todays security environment, passwords should really be the last line of defense.
In the second and final installment in this Website security tutorial, we cover some additional ways to manage Web crawlers.
Learn how to put up a "Keep Out" sign at your Website in this introduction to protecting your Website using robots.text from networking expert Aaron Weiss.
While WPA with PSK is more secure than WEP, it is not infallible. Learn how you can use it to its fullest advantage to protect your Wi-Fi network.
D-Link's unified threat management security appliance packs a huge number of features into one box. However, it also packs a huge price once you add all the upgrades and subscription fees. Is it too much for a good thing?
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?