- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Apr 2008
- Mar 2008
- Feb 2008
- Jan 2008
- Dec 2007
- Nov 2007
- Oct 2007
- Sep 2007
- Aug 2007
- Jul 2007
- Jun 2007
- May 2007
- Apr 2007
- Mar 2007
- Feb 2007
- Jan 2007
- Dec 2006
- Nov 2006
- Oct 2006
- Sep 2006
- Aug 2006
- Jul 2006
- Jun 2006
- May 2006
- Apr 2006
- Mar 2006
- Feb 2006
- Jan 2006
- Dec 2005
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- Oct 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Jun 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
- Dec 2001
- Nov 2001
- Oct 2001
- Sep 2001
- Aug 2001
- Jul 2001
- Jun 2001
- May 2001
- Apr 2001
- Mar 2001
- Nov 2000
- Oct 2000
A new report from the DOJ's Office of the Inspector General says the government is making a big mistake by not making ID theft prevention and prosecution a top priority.
Large non-profit organization, Georgia Legal, uses InfoExpress CyberGatekeeper to secure its network of 12 offices throughout the state of Georgia.
In the midst of its standoff with China over censorship, Google details hackers' activity designed to set up a botnet and launch a cyber attack against a very specific target.
A Palo Alto Networks report finds that social networking and collaborative applications are pervasive in organizations worldwide.
Panda Security's latest report says banker Trojans represent more that 60 percent of new cyber security threats, while traditional viruses are making a comeback.
More than 3.3 million people with student loans had their names, social security numbers, and other personal information stolen last week after a portable media device was swiped.
Microsoft touts 'defense in depth' as an effective deterrent after a white hat hacker last week demonstrated a complete takeover of Windows 7 running Internet Explorer 8.
A CA white paper offers advice on streamlining IT security management.
Big Blue lands partnership with FAA to develop novel cybersecurity monitoring systems while it aims to broaden collaboration with the government.
New Mac 10.6.3 update addresses a long list of security and stability issues.
Microsoft fixes a gaping security hole in Internet Explorer 6 and 7, plus tosses in fixes for nine other critical security flaws in the same out-of-band patch.
Microsoft will ship a patch that fixes a new zero-day flaw in Internet Explorer 6 and 7, driven by the urgency of attacks in the wild--so who's at risk this time?
A new study shows that almost all Microsoft vulnerabilities can be mitigated simply by eliminating administrator privileges from end-users.
Security consultant Diana Kelley outlines several key areas where enterprises can green their security compliance programs.
Pam Baker outlines the key questions to ask when mapping out a security policy for disaster planning.
Study finds that 76 percent of C-level executives now say that securing their business-critical apps is the most important aspect of their data protection program.
A white paper from IDC Government Insights and Tripwire looks at the challenges of securing public sector IT environments.
Network security can be a life or death proposition in a war zone. A new product provides secure wireless HD video in a walkie-talkie-sized device for just those scenarios.
Unsolicited e-mails most often target executives responsible for foreign trade and defense policies pertaining to Asian countries, according to Symantec.
As expected, security researchers found exploits in all of the targeted platforms in a contest that put browser security to the test.
A Secunia white paper contends that most users simply aren't willing or able to put in the time required to keep a typical system secure.
More than 7,000 Vanderbilt University students had their personal information compromised last month after a thief made off with a professor's desktop computer.
This year's hacking contest will put Google Chrome, Apple Safari, Microsoft Internet Explorer, and Mozilla Firefox on the firing line. Should we be worried?
Homeland Security's cybersecurity director, Richard Marshall, warns that universities aren't turning out enough cybersecurity experts and urges greater scholarship funding.
Mozilla patches a critical flaw that a few weeks ago it doubted even existed.
Deputy Assistant FBI Director Chabinsky describes growing professionalization, specialization in cyber crime that has led to emerging class of "career criminals."
A Microsoft white paper looks at the security and privacy issues surrounding cloud computing.
Symantec and research firm Sperling's BestPlaces study found that Boston and Seattle were the two U.S. cities most at risk for cyber attacks. Check out the complete Top 50 list.
Guard against malware and protect your data by configuring your PC to be as "bullet-proof" as possible.
Research firm Gartner argues in a new report that servers that are virtualized end up being less secure than before when it comes to network security.
Market Research Media anticipates that the federal cybersecurity market will grow at about 6.2 CAGR over the next six years.
Security breaches can be very costly--but so can a full, professional-grade security audit. In this Internet.com eBook, learn how to conduct your own comprehensive security tests.
Landmark Internet security legislation returns with 'kill switch' provision dropped and scales back the potential privacy incursions outlined in the original version.
Google patches Chrome for eight vulnerabilities that could have left users at risk.
Core Security Technologies said it's found a nasty bug in Windows Virtual PC that could let an attacker bypass important security protections. But what does Microsoft think?
The FBI said losses from cyber criminal activities more than doubled in 2009 and that men were more likely than women to be scammed for larger sums.
Taking down a botnet, especially one of the biggest, is a daunting task that needs to be done in 'layers' and severing the creature's connections to the outside world doesn't get rid of the beast.
The social networking site is dealing with yet another malware scam that attempts to steal users' usernames and passwords to access Facebook users' online banking accounts.
A Gartner report warns that through 2012, 60 percent of virtualized servers will be less secure than the physical servers they replace.
Eric Geier offers an interesting list of free security apps, including biometric logins, encrypting flash drives, and locking down public workstations.
RSA has added more than 70 new features to its Data Loss Prevention (DLP) applications designed to protect sensitive information in the enterprise.
The SEC convinced a U.S. federal judge to freeze the assets of a Russian company accused of using investors' stolen passwords and usernames to game equity trades on some 38 stocks.
McAfee's new Consumer Threat Alert program is dedicated to keeping consumers informed about the latest malware and online scams.
Key security considerations for enterprises to bear in mind when deploying the Apple iPad.
A CloudSwitch white paper looks at the challenges of ensuring security in a public cloud.
On the heels of a researcher releasing an exploit for a newly discovered security hole, Microsoft has vowed to deliver a speedy patch and to help out worried users.
Presenting potential risks to businesses and a new realm of privacy challenges to individual users, Twitter takes its geotagging feature live.
The dollar loss from cases referred to the Internet Crime Complain Center totaled $559.7 million in 2009.
The government extends its dialog with industry and citizens on the vital topic of cybersecurity.
A cyber attack breached the Los Angeles Westin Bonaventure Hotel & Suites point-of-sale systems for several months last year.
Security authentication and single-sign on are among the benefits to enterprises using Vista and smart cards.
A white paper from FireEye offers guidance of protecting data from malware-related theft.
More than half the Apple browser's security flaws are in the WebKit rendering engine, which is also used by Google's Chrome.
The bank came clean this week, admitting that data stolen by a former IT specialist exposed a lot more clients to possible identity theft than it previously suspected.
What started as 'targeted' attacks may now expand into a full-blown pandemic, since a hacker figured out how to turn hints into a Metasploit exploit module.
A study from Absolute Software and the Ponemon Institute finds that 56 percent of business managers disable encryption.
IBM was ranked the most trusted company for privacy among IT companies, fending off the likes of HP and eBay for the coveted top spot. But Facebook wasn't as fortunate.
A Microsoft white paper looks at the key threats and best practices surrounding enterprise social networking.
If your laptop is running either the Ultimate or Enterprise editions of Windows 7 or Windows Vista, you can take advantage of the BitLocker feature to encrypt the hard drive. Here's how.
Symantec this week demonstrated a new Object File Server technology designed to help deal with secure data management and storage issues.
Panda Security discovered Confiker, Mariposa, and Lineage password stealing malware samples installed on a recently purchased Vodafone HTC Magic smartphone.
More than 35,000 Arkansas National Guard soldiers are learning that their names, social security numbers and other personal data are at risk after an external hard drive vanished.
Security software firm shows prototype system designed to help carriers weed out bad apps, as well as security risks.
A report from HP and the CSA looks at the potential security threats around the use of cloud services.
Besides patches for Microsoft Excel and Windows Movie Maker, Patch Tuesday includes a warning about zero-day attacks on some users via Internet Explorer 6 and 7.
For secure, portable external storage needs, the Apricorn Aegis Padlock combines hardware encryption with a built-in numeric keypad and PIN that stop unauthorized data access.
For the second time in two years, Wyndham Hotels and Resorts says hackers accessed its computer systems, stealing sensitive information, including customer payment card data.
Cisco recently announced the expansion of TrustSec to help create identity secured networks.
Chinese news sources report that Chinese officials say Google didn't report the cyber attacks it experienced to state authorities.
Government security experts are warning consumers that using Energizer's DUO USB battery charger could leave their Windows PCs open to attack from hackers.
Enterprise WLANs may be safer than ever but the work of wireless security is never done.
Is the Internet safe? Jim Bidzos, who organized the first RSA conference in 1991, says most consumers don't think so.
An RSA white paper looks at the key issues that need to be considered to ensure a safe cloud computing environment.
The Radicati Group also predicts that the market will exceed $1.1 billion in 2010.
Part of keeping your data secure is creating a reliable, secure system of backing up that meets all your needs. We help you shop for the best solution.
Hackers and e-crooks have moved beyond the low-hanging fruit of online banks and eBay as primary targets for their elaborate phishing schemes, according to a new report.
Successful busts, such as the Mariposa botnet, require international and private sector cooperation, said FBI director Robert Mueller at RSA.
At the RSA Conference this week in San Francisco, some small vendors stood out for their innovative security solutions.
At the RSA conference this week, DHS chief Janet Napolitano calls for quicker action in securing the U.S. from a growing number of cyber threats.
RSA panel of experts says the U.S. is under daily cyber attacks by China, Russia, and their proxies. What can we do to protect our key systems and privacy?
Open source antivirus comes to the Windows desktop with a little help from a new cloud backend to accelerate security.
A Guardium white paper offers advice on developing a holistic approach to database security.
A Microsoft white paper looks at file types that are potentially executable, and explains the safeguards that protect against mishandling them.
Obama's Internet security advisor tells RSA crowd they need to secure their data, but his big news was the disclosure of a White House initiative.
At RSA, most heads are in the cloud with everyone from Symantec to IBM delivering new cloud-based security solutions.
Internet security experts say massive botnet attack impacted computers in more than 190 countries and more than half of the world's 1,000 largest companies.
New research from the Ponemon Institute and Compuware details sloppy data practices that pervade the financial services sector and outlines the potential consequences of a breach.
In the second and final part of this series, we cover more advanced methods of configuration and mounting of this open source tool.
Microsoft proposes throwing malware-infected PCs into quarantine and denying them Internet access. The company also announces availability for its new identity management product.
At RSA, IBM announces it will expand its security portfolio with new static code analysis and secure Web services.
Information is gold and cyber villains are getting more aggressive in their attempts to steal it. Data theft requires new ways of thinking, says Symantec CEO Enrique Salem at RSA.
Making sites go faster isn't enough for Citrix. Now it wants to make site delivery both faster and more secure.
A Veracode report finds that 58 percent of applications contain severe vulnerabilities.
A new zero-day vulnerability threatens to use Windows help files against users, if they can be convinced to press F1, the traditional key for help. ("It's a trap!")
A white paper from RSA and ESG looks at the challenges and benefits of desktop virtualization.
ThreatMetrix and CyberSource team up to build new, advanced identity protection applications to combat identity theft and further secure online transactions.
Learn the basics of encryption, including e-mail options and public key cryptography for enterprise users.
Gerry Blackwell looks into Gen. Alexander's statement that his responsibility is to "plan, coordinate, and conduct offensive...cyberspace operations."
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?