When warning about the risks of website attacks like SQL injection and remote file inclusion, we often talk about how these breaches can reveal “sensitive data.” What kind of sensitive data? ...
If you're even asking the question "what's the secure way to launch a cloud initiative," your company is ahead of many organizations, experts say. The time to consider security is a...
The effectiveness of malware detection, how well it catches infections, is the chief characteristic to consider when choosing an antivirus program. But resource consumption,...
SUPERAntiSpyware recently released version 5 of their antispyware and malware protection program, which they call their most significant update ever.In this review, we’ll take a loo...
The traditional stateful firewall filters traffic based upon ports and protocols. For example, blocking or allowing the entire port 80 for HTTP traffic or port 443 for HTTPS traffic...
The best way to ensure that your Linux server is secure is to build it from scratch with a minimum amount of code that can be exploited by a hacker -- a custom compiled kernel and t...
The first thing to do is determine the validity of any antivirus alerts. A popular malware technique is to display alerts saying a computer is infected in hopes of the user downloa...
If your SSL server have misconfigurations and known vulnerabilities that make it insecure, follow these ten tips to avoid common SSL security mistakes. 1. Disable support for SSL v2...
A decade ago, secure remote access was a right enjoyed by a privileged few: road warriors, executives, sales forces, etc. But ubiquitous high-speed Internet connectivity, coupled with explosive growth...
In early 2010, PDF exploits were by far the most common malware tactic, representing more than 47 percent of all Q1 infections tracked by Kaspersky Labs. By mid-year, PDF exploits had fallen to 30 per...