TrendLabs researchers are warning of malware disguised as an Adobe update.
Playing fast and loose with software keys is the least of it. Properly defining piracy and its legal ramifications is a good start to crafting your organization's software compliance policy.
It's easy to get worked up and lost in a tangle of security bulletins. But it only takes a 'bird's eye view' of the problem, and a few easy steps, for admins to greatly diminish the risk to their networks.
When the shock subsides and the finger pointing comes to an end, it's time to take steps to prevent your Web site from getting hacked again.
Businesses are mounting a formidable defense against viruses, worms and spam. So why are they leaving a gaping hole open for spyware?
Technology evolves at a brisk pace, so why aren't your tutorials keeping up? Get up-to-the-minute tips on securing your systems from experts in the field.
Stopping spyware is usually just an easy (and mostly free) download away. Even ISPs are getting into the act by helping their users banish the intrusive code. But where do admins turn when they want to provide the same protection for their networks?
A TCP flaw has the potential to bring the Internet crashing down, laying waste to e-commerce as we know it. Or does it?
Best Buy, Symantec, Citibank, eBay... What do these companies have in common? Scammers are banking on their good name to trick users into coughing up valuable information. Protect yourself and your staff.
Unlike their deskbound cousins, portables regularly venture outside of the safe confines of your network. You may not be able to control where they go, but you definitely have some say in what hitches a ride back with them.
Despite the notion that 'true' hackers wouldn't be caught dead using trojans, legions of attackers still rely on them to prop open network defenses.
Roaming workers don't want to hunt for jacks and all of upper management wants to sip espressos at the coffee shop while catching up on e-mails. Make sure you're ready when Wi-Fi makes a play for your corporate network.
What secrets are your Word docs revealing about your company?
The blame game: Where do an administrator's responsibilities end and a user's begin?
Months before its official release, AO members weigh in on SP2's security enhancements.
Learn how the venerable host command can reveal more about your network than you think, not to mention what hackers probably already know.
What if your Web business were held at virtual gunpoint? AO members discuss coping with demands of payment under the threat of getting DDoSed into oblivion.
MyDoom is quickly making the days of SoBig and Blaster seem like a walk in the park.
An introduction to intrustion detection systems and basics on protecting your network with Snort.
Are 'hardened by default' systems lulling computer users into a false sense of security?
Setting up a complex network? Discover how VLANs can work in your favor, but not before exploring some security implications.
More often than not, a weak user password is the only thing standing in the way between an intruder and your company's valuable data. Lay the foundation for a strong password policy with this week's spotlight AO discussion.
Are you an easy target? Delve into the factors that motivate an attacker to breach your network's security.
Another tool for your bag of tricks! Get to know a technology that can detect even the stealthiest of intrusions, regardless of how lightly a hacker treads.
Granted, a new OS install is bound to cause an incompatibility or two. Rarely, however, does it actually wreck your hardware! Sadly, a certain Linux distro can do just that.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?