- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Apr 2008
- Mar 2008
- Feb 2008
- Jan 2008
- Dec 2007
- Nov 2007
- Oct 2007
- Sep 2007
- Aug 2007
- Jul 2007
- Jun 2007
- May 2007
- Apr 2007
- Mar 2007
- Feb 2007
- Jan 2007
- Dec 2006
- Nov 2006
- Oct 2006
- Sep 2006
- Aug 2006
- Jul 2006
- Jun 2006
- May 2006
- Apr 2006
- Mar 2006
- Feb 2006
- Jan 2006
- Dec 2005
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- Oct 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Jun 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
- Dec 2001
- Nov 2001
- Oct 2001
- Sep 2001
- Aug 2001
- Jul 2001
- Jun 2001
- May 2001
- Apr 2001
- Mar 2001
- Nov 2000
- Oct 2000
Turn-key service delivers Web-based control over employee smartphones helping businesses manage iPhones, Android-based devices, BlackBerrys, and Windows Mobile smartphones.
A CA white paper examines the key security measures required to ensure the safe deployment of cloud computing technologies.
New tool demoed at the Black Hat security conference shows how easy it is to attack routers--and how to defend against those attacks.
At Black Hat Thursday, retired General Michael Hayden, a former director of the CIA, compared cyberspace to other military domains, such as air, land, and sea, and likened it to the North German Plain during the Cold War.
Law enforcement agents in Slovenia working with the FBI arrested a 23 year-old Slovenian man they say is responsible for creating and selling the Butterfly botnet kit used to build the Mariposa botnet.
Black Hat research takes a deep look at SSL security and finds it lacking due to a number of common configuration issues.
Microsoft expands security disclosure program as it tries to work closer with researchers and other software vendors, including Adobe.
Offerings for small businesses with big security needs range from a complete hardware solution from Juniper to managed services from KACE.
U.S. Secret Service and Verizon also say the vast majority of breaches could have been avoided with basic precautions.
New open source project set to correlate security information from multiple types of technologies with a defense security router.
Symantec's July 2010 MessageLabs Intelligence report finds that the percentage of spam containing shortened hyperlinks has increased significantly over the past year.
The Quarterly Global Threat Report offers insight into the types of attacks happening on enterprise networks. Adobe Reader/Acrobat, Sun Java, and Adobe Flash were the three most common malware targets over the first half of 2010.
The latest whitelisting release from CoreTrace adds application intelligence capabilities and more permissive options for new application installation.
Resolving various cyber crime attacks costs the typical organization almost $4 million a year, according to the latest survey from ArcSight and the Ponemon Institute.
At Black Hat USA 2010 Las Vegas, mobile apps, Internet infrastructure enterprise networking, and more go under the microscope starting Wednesday, as security researchers probe all manner of Internet connectivity and security issues.
A Sophos white paper examines the importance of endpoint security.
Microsoft's technology for blocking malware and phishing attacks appears to be paying off for users, as the company claims a cool billion potential attacks blocked.
The Anti Phishing Working Group is now lending its expertise to the IRS to help root out online and offline phishing scams that use a combination of e-mails and faxes to steal identities.
With the release of Firefox 3.6.8, Mozilla is fixing only one security flaw omitted from last week's release, while work progresses on Firefox 4.
As bug sleuths find and disclose more security holes in Microsoft products, giving the company little or no advance warning, the software titan tries to lower the tensions between all parties in order to better protect users.
Mimecast reports that 62 percent of IT departments say there's always a risk in storing data on servers outside the business.
Secunia's report doesn't measure the severity of security flaws, but it says some interesting things about how the focus of malware attacks has shifted.
The new Tripwire Enterprise 8.0 release is designed to automate the process of bringing IT systems into both regulatory compliance and a company's internal mandates.
Cisco's midyear security report paints a bleak picture of non-compliance by IT users for enterprise policies.
A Nasuni white paper examines the key security risks inherent in cloud storage solutions, as well as the ways those risks can be mitigated.
The database giant says the new release of Oracle Identity Management 11g "radically simplifies" application security.
Symantec's MessageLabs report finds that the shortened hyperlinks that are a virtual necessity on Twitter are one of the fastest-growing sources of spam and malware.
If Information Systems Security is your game, earning a few top certifications can also earn you top dollar.
Ahead of Black Hat, Firefox 3.6.7 addresses a slew of flaws -- one of which had been fixed weeks ago by Google Chrome.
A Google report states that virus and spam volumes both increased in the second quarter of 2010.
Forefront Endpoint Protection offers new features for enterprise admins while the free Security Essentials gets an overhaul.
A Deloitte venture capitalist believes cloud computing will force companies that have deferred investment to become more efficient by buying new systems, among other things.
The Dell Kace Secure Browser takes a different approach to isolating and managing browser instances to improve enterprise security.
A Sophos white paper offers advice to schools on how to protect student data.
New zero-day attacks on all Windows OS's spring from removable file storage vulnerability, says Microsoft.
In Sophos' latest Dirty Dozen spam report the UK has jumped to fourth place, up from ninth place earlier this year.
We a look at the new book, "Cyber War: The Next Threat to National Security and What to Do About It." Is the best defense against cyber attacks to disconnect the power grid from the Internet?
The security software vendor's latest cloud security product screens all inbound and outbound email messages sent from any PC or mobile device.
An M86 Security white paper offers advice on implementing an effective data loss prevention policy.
A major historical milestone will see the Net's core infrastructure get a new security feature. A look at why it matters and what else the Internet's operators are doing to keep the Net safe.
According to Commtouch's latest report, spam comprised an average of 82 percent of all email traffic in the second quarter of 2010.
Security software vendor Sophos' latest "Dirty Dozen" list of top spam-relaying countries paints a familiar picture with usual suspects such as the U.S. and India atop the chart.
An M86 Security white paper examines the benefits of combining cloud and on-premises security solutions.
Security researchers have discovered a new malware campaign that uses a bogus email request for payment from eBay to infect users' computers.
The network security provider delivers new levels of performance in an entry-level appliance aimed at distributed enterprises, SOHOs and small businesses, and service providers delivering managed services in CPE deployments.
A Secunia report finds that the software industry is continuing to produce software with a surprising number of vulnerabilities.
Windows 7 Enterprise delivers enough security improvements to justify the cost and hassle of migration. We outline ten of the best security benefits.
American Airlines' parent company says the personal data of some 79,000 current, former and retired employees was compromised after a hard drive was stolen from its Fort Worth, Texas headquarters.
A Sophos white paper looks at the key directives and legislation affecting the member states of the European Union.
A Cyber-Ark Software survey finds that 41 percent of respondents have used administrative passwords to snoop on sensitive or confidential information.
University of Maine officials say hackers managed to pry their way into a pair of file servers storing the social security numbers and other personal data of 4,500+ students.
Tasked with coordinating and improving cybersecurity operations across the agencies and private sector, Howard Schmidt has a big job, and he's not looking for a silver bullet.
Public-private partnerships may be the lynchpin of federal cybersecurity, but experts warn that many stumbling blocks remain.
An M86 Security white paper examines some of the newer methods being employed to break through corporate defenses.
Julys patch release may not be as demanding as June, but in fixing three critical holes, its an important one for administrators to deploy ASAP.
More than 83 percent of IT and IT security leaders say their organizations were recently targeted by advanced threats.
A group of hackers says it will begin releasing proof-of-concept exploit code for Microsoft vulnerabilities in retaliation for the software giant's recent criticism of third-party security researchers.
Protect your business or home Wi-Fi network by thinking like a hacker. Find your greatest WLAN weaknesses and then guard against them.
Microsoft puts users and developers on notice that the Windows Foundation Classes have a security flaw -- making some apps vulnerable to attackers.
Weve identified seven common computing habits that have security implications. Well tell you how and why you should break them.
A MessageLabs white paper offers advice on how to mitigate 10 key security risks.
A recent AppRiver report finds that more than one in 10 spam emails contained a virus during the past six months.
A MessageLabs white paper looks at the methodology behind targeted Trojan attacks.
While Apple has integrated some basic security measures into the settings of the iPhone itself, several third-party apps can add key security functionality to the device.
While 95 percent of teenagers are confident in their ability to stay safe online, 27 percent have accidentally infected their home computer with malware.
Fans of the 'Twilight' vampire saga could be in for a nasty surprise while searching the Web for movie information.
Annual IT security gathering urges attendees to adopt more pragmatic, risk-centric, business-focused approaches.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?