Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.
Make sure your organization is prepared for attacks and breaches by putting together an incident response plan and incident response team.
Our colleagues at Datamation pulled together a list of "50 Awesome Open Source Apps You've (Probably) Never Heard Of." Among them, we found some valuable computer security assets.
For businesses, these apps offer the best of both worldsthe flexibility, security, and cost savings of open source combined with the peace of mind that comes with commercial support.
Open source offers email encryption, anonymous file sharing, anonymous surfing, and many other apps for those with pressing privacy needs.
Open source software for anti-spam, firewalls, forensics, encryption, log monitoring, passwords, and more.
Without much fanfare, the open source security area is growing rapidly. Here are top contenders from anti-virus, firewalls, forensics, intrusion detection, and more.
Can companies make money by selling a product customers can get for free?
Are open source security apps a good choice for your company? A look at the pros and cons. Plus: a handful of apps in the forefront.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?