High profile breaches and mobile devices are driving IT security spending.
Security threats are too pervasive, persistent and costly to think about IT security after the fact, according to Ernst & Young.
The new version adds enhancements to ease of use and deployment.
The attack has been demonstrated by researchers from the Vulnerability Assessment Team at the Argonne National Laboratory.
Version 3.5.84 patches a vulnerability that could allow an attacker to access a victim's contact list.
Rene Rebollo Jr. was sentenced to eight months in prison and ordered to pay $1.2 million in restitution.
A laptop containing patients' personal data was stolen from a car parked at a local restaurant.
More than 20 million computers are infected by Conficker, TDSS, Zeus and Koobface, according to Kaspersky Lab.
Seventy-two percent of all e-mail borne malware in September was identified as generic polymorphic malware variants.
Symantec is warning of malicious attachments disguised as scans being e-mailed automatically from printers.
The botnet, also known as Waledac 2.0, comprised about 41,000 infected computers worldwide.
A group calling themselves CabinCr3w took credit for the posting.
On Sunday morning, a hacker defaced hundreds of thousands of sites hosted on InMotion's servers.
Chat forum Al-Shamukh and secondary site Al-Fidaa were hit by denial of service attacks.
Seventy-five sites belonging to Indian organizations, government bodies, universities and police were compromised.
The site redirected visitors to malware-laden Web sites for most of Monday morning.
The Trojan deactivates some network security features, and sends information about the infected Mac to a remote server.
The account was compromised by the same hackers who recently hit Fox News' and NBC News' Twitter feeds.
The updates close a security hole that resulted in weakened passwords.
The site was defaced by hackers calling themselves the Syrian Electronic Army.
The data was published in response to the officer's recent use of pepper spray during a protest.
The company found critical security issues in every handsfree kit it tested.
The attacks have compromised 1,465 computers in 61 different countries.
The new Trojan is disguised as a PDF file.
SMS messages and voicemails ask mobile phone users to call in and reactivate their credit cards.
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Apr 2006
- Mar 2006
- Oct 2005
- Sep 2005
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?