- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Apr 2008
- Mar 2008
- Feb 2008
- Jan 2008
- Dec 2007
- Nov 2007
- Oct 2007
- Sep 2007
- Aug 2007
- Jul 2007
- Jun 2007
- May 2007
- Apr 2007
- Mar 2007
- Feb 2007
- Jan 2007
- Dec 2006
- Nov 2006
- Oct 2006
- Sep 2006
- Aug 2006
- Jul 2006
- Jun 2006
- May 2006
- Apr 2006
- Mar 2006
- Feb 2006
- Jan 2006
- Dec 2005
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- Oct 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Jun 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
- Dec 2001
- Nov 2001
- Oct 2001
- Sep 2001
- Aug 2001
- Jul 2001
- Jun 2001
- May 2001
- Apr 2001
- Mar 2001
- Nov 2000
- Oct 2000
Learn how to plan, deploy, secure, and manage your home or business Wi-Fi network.
Quick quiz: Does Microsoft charge users for its Security Essentials software? How do you tell whether software is from Microsoft or from hackers trying to hold your PC for ransom?
Columnist Sonny Discini takes a stand against outmoded security policies and points out flaws in the conventional wisdom.
But what can users do to disinfect hundreds of thousands of compromised computers worldwide, even as Microsoft suspends nearly 300 rogue Internet domains?
IBM's X-Force security report finds that hackers have mastered the art of attacking Web browsers and document readers, even though application security has improved.
SQL injection attacks pose a massive potential threat to your organization. Learn ten ways to prevent or mitigate them.
A Lockton white paper offers advice on minimizing risk and maximizing security.
As location-based services begin to take off, privacy concerns have also been raised. Just how public should your location at any given time be?
Chipmaker says it, too, was hit by a 'sophisticated' cyber attack in January, right around the same time that Google, Adobe, and a couple dozen other enterprises were hacked.
The Texas-based company is in the process of deploying a secure network of more than 3,000 video cameras covering 335 buildings throughout its home state.
Co-sponsors of controversial cybersecurity legislation press for expanded executive authority in hearing that lays out troubling concerns about U.S. digital defenses.
Symantec reports that 75 percent of the organizations it surveyed experienced cyberattacks in the last 12 months.
Symantec's 'State of Enterprise Security' report finds that 100% of surveyed companies experienced "cyber losses," with an average loss of $2 million each in 2009.
3Com announced Monday a trio of new products including a new switching platform and a pair new security initiatives from its TippingPoint security division.
The IT department at Valdosta State University discovered that a hacker managed to breach a school server storing the personal information of more than 170,000 students and faculty.
Columnist Kenneth van Wyck takes Windows 7 and Snow Leopard out for a spin to see which operating system offers the best security.
The Internet's hallmark for trusted sites rolls out a new mark signifying that a site is free from malware, aimed at sites that don't require SSL.
A white paper from Symantec offers an in-depth analysis of the popular botnet package.
The security software company announced improvements to its portfolio of on-demand e-mail and Web protection applications after eclipsing the 575,000-customer threshold.
Sometimes knowing who, what, where, and when is not such a good thing. Security consultant Diana Kelley explores the dangers of geo-location to your business's information security.
Testing wireless security is critical to safeguard business data and comply with regulatory mandates. This in-depth review evaluates Motorola's new AirDefense add-on.
A NetWitness white paper provides a thorough analysis of the Kneber botnet.
Technology built into routers from 15 vendors could enable an attacker to wiretap anyone, but there are fixes to be had.
Mozilla offers Firefox 3.0.18 and 3.5.8 patches for a trio of critical security vulnerabilities that Mozilla fixed a month ago for Firefox 3.6 users.
Yet another commercial tool integrates open source metasploit for security testing is this a good thing?
After a week-long investigation, Microsoft bug sleuths claim they've hunted down the cause of multiple reboots and crashes inflicted on Windows XP users.
So-called "Kneber" botnet collects log-in credentials to online financial systems, social networking sites, and e-mail systems to steal corporate and government data.
A new report from M86 Security provides a detailed analysis of spam during the second half of 2009.
In a cyberwar-game simulation held Tuesday in D.C., the National Security Council simulated its response to a massive cyber attack--and raised troubling questions.
Eric Geier gives step-by-step instructions for improving laptop security by protecting your data with TrueCrypt disk encryption.
A ScanSafe report says cybercriminals are now focusing on much broader targets than credit cards and other personal data.
In a second major update, Google's week-old social service gets another makeover in response to user concerns over privacy.
The companies are collaborating on a set of jointly designed, interoperable applications that will be integrated into Brocade's networking equipment products.
A CipherOptics white paper examines the key issues surrounding network encryption.
Responding to a torrent of criticism, Google has made its privacy controls more visible in its new social service Buzz, and pledges to keep iterating as it looks to build a social network out of e-mail.
Company confirms that update meant to fix 17-year-old security bug is causing endless reboots and the Blue Screen of Death for some Windows XP users.
Javelin Strategy & Research report finds that identity theft cases increased 12 percent last year and affected more than 11.1 million adults in the U.S.
AvMed Health Plans is warning more than 200,000 insurance subscribers that a pair of laptops were stolen sometime in December, exposing customers' names, addresses and Social Security numbers.
A report examines key cybersecurity issues related to the Olympic Games in Vancouver.
Excitement about Google's new social e-mail application has given way to concerns that the service threatens to publish sensitive information about people's social connections.
The Firefox developer revealed it had mistakenly identified an add-on to its popular browser as malware. Version 4.0 of the Sothink Video Downloader does not contain a Trojan.
Chrome 4 gets its first security fixes--three of them rated as "high" in importance. But it's not all bad news.
Using an alternative DNS provider, such as OpenDNS or Google's Public DNS, can improve performance and increase security. It's worth taking the time to compare your alternatives.
More than 27,000 people had their names, Social Security numbers, and in some cases, bank account information, compromised when Ceridian's online service was breached.
McAfee security researchers predict Internet-based cyber attacks will continue to escalate in quantity, sophistication as hackers target the most popular social networking sites, search topics in 2010.
A MessageLabs white paper looks at the challenges of managing and securing email as a critical business component.
In this months Patch Tuesday, software giant Microsoft releases one of the largest bundles of security fixes ever, but not one for the latest zero-day.
One of several non-security updates is causing system crashes for some Windows 7 and Windows Server 2008 R2 users. What does Microsoft have for a solution?
As we strive to improve data security in 2010, we can learn from some of the biggest data mistakes made last year--including one single breach that compromised 130 million records (this means you Heartland).
A review of major data breach incidents in the past year found that most hackers used SQL injection to infiltrate enterprise networks.
A Sophos white paper offers advice on how to stay protected.
Good anti-virus protection is a must, but which should you choose and how much--if anything--should you pay?
No matter who wins the game, network security firm warns that post-Super Bowl Monday could leave enterprises dealing with security issues.
A Forrester Research report looks at recent changes in the strong authentication market.
Hackers, possibly from China, managed to infiltrate the Iowa Racing and Gaming Commission's database last month.
Microsoft warns users to protect themselves from a zero-day bug in Internet Explorer (IE) after it was disclosed Wednesday at the Black Hat hacking and security conference.
Microsoft's February patch drop is a doozy with 13 patches planned for next week's monthly Patch Tuesday updates.
A MessageLabs white paper looks at the evolving nature of malware threats to the enterprise.
In the second and final installment in this Website security tutorial, we cover some additional ways to manage Web crawlers.
Old flaws with new attack vectors re-emerge for IE on Windows XP, but there is help for users.
A McAfee report finds that 54 percent of security executives say their companies have already suffered large scale cyber attacks.
Security software vendor Sophos' survey reveals that 72 percent of companies are concerned that employee behavior on social networking sites, including Facebook and Twitter, will put their data at risk.
Report finds the majority of financial Web site customers reuse the same logins elsewhere, posing a potentially serious security risk.
Fake charities tied to the devastating earthquake in Haiti and 419-style scams related to the upcoming World Cup soccer tournament were common spam themes in January, according to AppRiver.
More than 4,000 patients' personal information was compromised after a laptop was stolen from an employee of the University of California, San Francisco (UCSF) medical school.
Black Hat security researcher details flaws including XSS-like attacks -- and what Web site owners and developers can do to avoid them.
When it comes to corporate data, you can never be too careful. Security expert Michael Horowitz offers invaluable tips for securing your PCs.
Security is among the biggest factors that could hinder broader cloud adoption. These two startups have novel solutions that will help drive adoption in 2010 and beyond.
A Bit9 white paper examines various options for preventing the installation and execution of unauthorized software.
Follow these seven wireless security tips to lock down your home or small business Wi-Fi network.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?