The gang of virus writers behind the virulent Bagle family of worms actually has issued a patch to its malicious code.
The CTO of Alert Logic Inc. says while companies are busy protecting their perimeters, they're not thinking about what threats may already be inside hiding on their networks.
The era of the mass-mailing worm dominating all other malware in the Wild may be coming to an end. Trojan horses aimed at specific targets are increasing in number and severity.
A new scam that focuses on Chase Manhattan customers shows a new level of malicious sophistication, say analysts.
The death of the firewall has been greatly exaggerated, according to analysts. But it's not your father's firewall, either. The security technology is morphing into a whole new role in the enterprise.
After a record-breaking January, malware attacks dropped 26 percent last month. But the rate of attacks still was 39 percent higher than it was a year before.
Corporate America has made some significant strides in information security, but it's not enough. IT will have to up its game to battle better organized and more sophisticated cyber criminals.
Speaking at the RSA Security Conference, FBI Director Robert Mueller said the bureau needs help from corporate IT to take on today's well-organized and sophisticated cyber criminal.
The dreaded Kama Sutra worm has caused little damage around the world. But while everyone was focused on it, another virus took down the Russian Stock Exchange for an hour late on Thursday.
Security advisors are warning IT and security administrators to make sure their networks are clear of the Kama Sutra worm before its payload is triggered on Friday.
The American Skiing Company is securing its cash registers while making their workers more efficient and more at-ease -- all with the touch of a finger.
Salaries are heading up again for security professionals, but don't expect a bachelor's degree to help you out very much, according to a new study. And find out what makes security types angry and happy...
Microsoft, bowing to customer pressure, issues patch for .WMF flaw ahead of next week's scheduled monthly release.
Malware writers are no longer creating Blasters and Slammers. They're not trying to take down millions of systems, but keep them running so they can steal the information on them.
The Zero Day exploit of the Windows Metafile bug has racked up six variants as of Thursday afternoon and has left security analysts wondering what's coming next.
Spammers are throwing in the towel on old tricks -- like pornographic spam -- and beginning to target individuals.
November was a record-breaking month for malware attacks, with a Sober variant leading the charge.
This year's ''Laws of Vulnerabilities'' study shows that administrators are getting better at patching, but it's still not good enough.
With IM malware increasingly creating a sea of variants, and email worms mutating into IM threats, analysts say it's time to focus on securing instant messaging.
The release of a Trojan horse that exploits Sony's controversial copy 'cloaking' tool is raising fears among users and music lovers around the globe.
The demand for IT workers is growing, and salaries are inching up along with job demand, according to new analysis.
A new security appliance is aimed at detecting and stopping zero-day attacks.
The potential for insider threats to the corporate network is keeping IT execs awake at night. Actually, 25 percent say they're literally losing sleep over it.
A record number of malware hit the Internet last month, but none were killer viruses.
A new study shows small to medium businesses lack the expertise to battle phishing and spyware.
- Apr 2006
- Mar 2006
- Feb 2006
- Jan 2006
- Dec 2005
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- Oct 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Jun 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?