- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Apr 2008
- Mar 2008
- Feb 2008
- Jan 2008
- Dec 2007
- Nov 2007
- Oct 2007
- Sep 2007
- Aug 2007
- Jul 2007
- Jun 2007
- May 2007
- Apr 2007
- Mar 2007
- Feb 2007
- Jan 2007
- Dec 2006
- Nov 2006
- Oct 2006
- Sep 2006
- Aug 2006
- Jul 2006
- Jun 2006
- May 2006
- Apr 2006
- Mar 2006
- Feb 2006
- Jan 2006
- Dec 2005
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- Oct 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Jun 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
- Dec 2001
- Nov 2001
- Oct 2001
- Sep 2001
- Aug 2001
- Jul 2001
- Jun 2001
- May 2001
- Apr 2001
- Mar 2001
- Nov 2000
- Oct 2000
Educating consumers presents issues, but with business, government, and individuals all working together, panelists were optimistic about our cyber security future.
The updates fix more than a dozen known exploits, including a PDF vulnerability that hackers were using to usurp control of users' computers.
Making good on its promise to Canadian privacy authorities, social networking giant Facebook said it has simplified the permission controls for users sharing data with third-parties.
At the Red Hat Summit in Boston last week, Josh Bressers, a senior security engineer at Red Hat, explained why open source really is the best model for building secure software.
New cloud-based security service helps protect companies from malware without the need for any on-premise software or hardware.
First new releases debut after HP's 3Com acquisition, but full integration of the two companies' products is still a work in progress.
A survey of IT professionals finds the growing use of iPhones and other personal mobile devices on corporate networks poses a security problem.
New study examines 119 million domain names to discover some surprising results into how many are using SSL properly.
An Osirium survey finds that companies are being exposed to 'unsustainable levels of operational risk.'
Thousands of students and dozens of faculty members had their names, social security numbers and other PII exposed for months before officials locked down an unsecured database.
In the second update of the month, the newly released stable edition of Google's browser patches security vulnerabilities while throwing in Flash integration, to boot.
A Cyveillance white paper examines the security threats presented by social media.
The Obama administration's leadership is motivating colleges and universities to step up and train an army of cyber warriors.
An nCircle survey finds that IT professionals' leading concern for 2010 is meeting security compliance requirements.
Microblogging service Twitter agrees to settlement with Federal Trade Commission regarding high-profile security breaches that dogged the site in early 2009.
A major milestone as the first major top-level domain is now secured with DNSSEC. But the process of securing all .org domains isn't done -- yet.
Out-of-Process plug-in support comes to open source Web browser, providing new crash protection for Linux and Windows users.
A Sophos white paper offers a suggested set of actions that will help reduce a company's vulnerability to online threats.
The BP oil spill is a cautionary tale for businesses that are functioning without proper business continuity and disaster recovery processes and procedures in place.
According to a Symantec survey, the majority of SMBs are now making data security their top IT priority, a big change from 15 months ago.
Small and mid-sized businesses are now spending an average of $51,000 a year on information protection.
Top analyst at research firm offers advice for IT managers trying to keep their systems secure in the face of constrained budgets and competing priorities.
While not sophisticated, botnets are a resilient method for launching attacks against government and business, says Gartner.
The Senate recently recommended a $143.4-million gutting of the Pentagon research agency's budget, including a $10-million cut to the National Cyber Range project.
The domain name systems managing body pushes DNSSEC as the way forward to make the Internet a safer place for all.
A Bitrix white paper suggests 10 key steps to take to maximize security.
Former attorney general argues for making security an institutional priority, outlines parallel between information security and 'war on terror.'
A Frost & Sullivan report looks at the growth drivers for the North American MSSP market.
San Antonio-based GlobalSCAPE has partnered with Rackspace Hosting to provide its Enhanced File Transfer Server as a subscription.
New app helps to cut down on phishing, ID theft, and account compromises by letting investigators quickly report stolen credentials and credit card numbers.
In yet another move to take a bite out of cybercrime, Microsoft's Digital Crime Unit sues over one of the largest spam attacks ever.
A critical milestone in the history of Internet security happened this week at a "key signing" ceremony. Are we all now safer as a result?
A Sophos white paper offers guidance on selecting an effective web security solution.
Microsoft's chief privacy strategist tells CFP conference attendees that protecting and ensuring accountability for user information requires the participation of a wide group.
White House IT officials have been exuberantly talking about moving government IT to the cloud, and the process is already in motion, but federal privacy officers are speaking up.
So-called "limited" attacks have appeared since a security researcher revealed a hack that could put Windows XP users at risk of attack.
Soon to be part of Symantec, VeriSign's SSL security certification business is growing as the need for SSL continues.
Perfect for SMBs, KRMC Cloud ($19.95 per drive per year) offers affordable thumb drive security with a public cloud service.
CyberSource's sixth annual UK Online Fraud Report finds that British businesses lost an average of £400,000 to online fraud in 2009.
Committee leadership races to bring major cybersecurity legislation that would expand White House and DHS authority over private sector to a markup.
Dozens of security fixes are made in the latest Snow Leopard update from Apple, and a few feature fixes, too.
An M86 Security white paper offers advice on implementing a successful data loss prevention strategy.
The State Department has been elevating the profile of Internet censorship as a diplomatic priority since Hillary Clinton took over, but free speech advocates are concerned.
A Deloitte survey of financial institutions finds that the majority of security budgets have increased.
Protect your business against this year's ten most worrisome Web application security risks.
Five California hospitals were fined a total of $675,000 last week by the state's Department of Public Health for failing to prevent unauthorized access to patients' data.
Alarmed at the recent exposure of more than 100,000 iPad users' data, FCC issues a warning on cybersecurity. Meanwhile, AT&T seeks to reassure customers that all's well.
The security software vendor acquires a cloud-based storage company to provide online backup and data synchronization services for small businesses and individual consumers.
A new World Cup-themed malware campaign is incorporating a two-pronged strategy to target and infect large Brazilian finance, chemical and manufacturing firms.
At both the state and federal levels, a bevy of bills and laws are proposed or in effect, which require securing and even encrypting PII.
Windows XP may be nine years old but, as the most popular version of Windows, it leaves a lot of users in a precarious position when a serious security hole pops up.
World's leading social network partners with PTA to promote online safety, pledges $1 million to the cause.
How does Microsoft plan to handle a validation flaw in Windows XP that's not covered by its monthly Patch Tuesday series of fixes? Fix It, of course.
The security hole that allowed at least one organization to access e-mail accounts belonging to iPad owners including Michael Bloomberg and Rahm Emanuel has been closed, AT&T says.
According to a recent survey, 10 percent of IT professionals have cheated to get an audit passed.
Leading security software vendor and the world's largest computing company announced a multi-year deal that will keep Norton Internet Security on all HP PCs for free for 60 days.
An ISACA white paper looks at the benefits and the security risks inherent in social media, and suggests several risk mitigation techniques.
Adobe Systems says it will issue an important patch for an exploit to its popular Flash Player later this week, and fixes for Reader and Acrobat by month's end.
Nine highly critical flaws get patched in Chrome as Google's Chrome Frame hits beta.
With only three "critical" vulnerabilities to patch in June, you'd think that it was going to be an easy week for system administrators -- but you'd be wrong.
We outline the key considerations for companies looking to make informed, risk-sensitive, purchasing decisions when selecting a cloud-based e-mail solution.
A university computer holding the social security numbers and other critical data for 15,800 students was communicating with a botnet's command-and-control center for months.
A study by Osterman Research and Commtouch has found that 68 percent of service providers say outbound spam is costing them up to $100,000 a year.
HP will be providing infrastructure and applications integration for a Cyber Control System designed to provide strategic information and identify cyber threats for the USAF.
The software giant patches several bugs in Silverlight 4.0, the latest major release of the streaming media client.
Adobe warns of serious security flaws in flash and PDF that could be leaving millions of users open to attack.
Make strong software security initiatives a priority.
New security white paper details Google's security practices for its cloud-based apps.
A Google white paper examines the company's security policies and procedures.
Security-software vendors say hackers for months have been repeatedly targeting top-tier executives and government officials using the World Cup soccer tournament as a lure.
Speaking publicly for the first time since his installation in the top spot of the Defense Department's Cyber Command, Gen. Keith Alexander emphasizes the severity of the danger.
A pair of thieves who moved an enormous amount of counterfeit software applications through the online classified site have finally been busted.
A Kaspersky Lab report examines the leading information security threats for the first quarter of 2010.
A physician accidentally revealed the sensitive personal information of several hundred patients in the latest potential IT security breach to hit the medical field.
According to a report in the Financial Times, Google began moving employees to other operating systems after its systems were hacked.
Microsoft has released its advance notice to IT administrators and this month's Patch Tuesday event may not be nearly as easy May's patch drops.
An eEye Digital Security white paper examines current and emerging trends in cyber attacks and in methods of managing threats.
Malware scamsters have weaseled their way into an unknown number of online gaming accounts on the popular Chinese entertainment site.
These days, when it comes to the Internet, you can never be too careful. Learn how to more securely send and receive data via e-mail and FTP.
A Bit9 survey finds that only 32 percent of respondents feel confident that their businesses are protected from malware.
The latest clickjacking scheme on Facebook managed to trick hundreds of thousands of users into "liking" and posting malicious links on their personal pages.
A cloud-based authentication specialist wants to make financial transactions more secure through the use of one-time password technology on mobile devices.
An amendment included in the final version of the NDA act would install a permanent cybersecurity office in the White House and reshape government IT security compliance.
A new federal indictment exposes a common Internet scam--tricking users into thinking they've been infected with malware so they'll buy bogus security products from cybercriminals.
A Trend Micro white paper offers an in-depth examination of the highly successful botnet.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?