dcsimg

Threats - Article Archives - Page 212

More Windows Apps at Risk Following iTunes Patch?

August 20, 2010 |
A European security firm started out to warn Apple that iTunes for Windows had a critical fault, but now another security sleuth says it affects dozens of other programs, as well.
READ MORE

DIY Facebook Malware Kit Digs for Login Credentials

August 18, 2010 |
A new do-it-yourself malware kit called Facebook Hacker is extremely easy to use and, according to security experts, particularly adept at snaring passwords for Facebook, as well as other sites.
READ MORE

Half of Enterprise Employees Would Steal IP: Survey

August 17, 2010 |
A new study finds disquieting attitudes toward corporate data theft, with higher-paid employees the most likely to swipe intellectual property on their way out the door.
READ MORE

How To Defeat The U.S. In Cyberspace

August 16, 2010 |
An ethical hacker builds a master plan to crush America--or teach it how to defend itself.
READ MORE

Symantec Warns of New Wave of Trojan Spam

August 16, 2010 |
Latest attack contains information-stealing malware hidden in innocuous-looking attachments that masquerade as resumes, photos and sales leads.
READ MORE

Hackers Infiltrate Red Cross Website - Again

August 13, 2010 |
For the second time this year, hackers have compromised one of the humanitarian organization's websites with malware that can capture visitors' personal information.
READ MORE

Microsoft's Patch Plugs 'Spoofing' Exploit

August 13, 2010 |
One of Tuesday's patches could protect users from hackers trying to steal a user's identity and gain control of his or her system.
READ MORE

Breach Exposes 126K Florida Students' Info

August 12, 2010 |
Officials at six community colleges in Florida are notifying more than 126,000 students that their personal information was exposed online after something went amiss during a software upgrade.
READ MORE

Linux Security, Then and Now

August 12, 2010 |

At LinuxCon 2010, experts discuss Linux kernel security and the implications of adapting 1960s technology to meet 21st-century threats.

READ MORE

SMS-Sending Trojan Targets Android Smartphones

August 11, 2010 |
Security researchers at Kaspersky Lab have identified a Trojan that embeds itself in Android-based mobile devices and runs up texting charges by sending messages to premium-rate numbers.
READ MORE

Good Cybersecurity Requires Common Sense

August 11, 2010 |
At the USENIX security conference, a vulnerability expert warns against artificial approaches to shoring up information systems, urging firms to put smart security at the core of any IT deployment.
READ MORE

Malware Reaches Record Levels: McAfee

August 11, 2010 |
The security software firm's latest report finds more than 10 million new pieces of malware in the first half of 2010, an all-time high.
READ MORE

Microsoft: Big Patch Tuesday for IT Administrators

August 10, 2010 |
Security experts warn PC support personnel to plan ahead for one of Microsoft's biggest bug smashes ever, releasing a total of 14 patches that secure 34 vulnerabilities.
READ MORE

Fighting Insider Fraud

August 10, 2010 |
Attachmate Luminet is one of a growing number of enterprise threat management solutions designed specifically to target insider fraud.
READ MORE

Microsoft Tracks Another Zero-Day Vulnerability

August 10, 2010 |
Microsoft just patched one zero-day hole in Windows and now it's got a new one to contend with--a buffer overflow flaw in the kernel of all supported versions.
READ MORE

Senate Dems Push Data Breach Bill

August 09, 2010 |
Latest effort would require enterprises and nonprofits that store sensitive information to tighten security requirements and notify consumers in the event of a data breach.
READ MORE

Top Ten Web Malware Threats

August 09, 2010 |
Web-borne malware encounters continue to rise, leveraging a variety of vectors, methods, and exploits. Use this list to identify and fight trends that are likely to target your Web servers and users.
READ MORE

Adobe Races to Ready Patch for Another PDF Vulnerability

August 06, 2010 |
After a serious security flaw in its Acrobat and Reader applications surfaced at last week's Black Hat security conference, Adobe wants users to know it's rushing out a fix.
READ MORE

How to Choose the Right Web Application Firewall (WAF)

August 06, 2010 |

An exhaustive look at all the ins and outs of shopping for a WAF. Doing the RFP work up-front will help to ensure that your organization gets the right tool for the job. Our expert tells you how.

READ MORE

Cisco CSO: Vulnerabilities Will Always Exist

August 06, 2010 |
The company's chief security officer, John Stewart, explains Cisco's new approach to secure development and building trust among IT buyers -- a plan that he says is modeled in part on Microsoft's strategy.
READ MORE