Threats

How Hackers Can Benefit IT Security

The word "hacker" is often misconstrued to be a bad thing, though that's not always accurate. That was the message delivered by security researcher Joe Grand at the SecTOR security conference today ...

Air Force Calls Malware Infection a ‘Nuisance’

The U.S. Air Force has stated that a recent malware infection of its drone fleet was only a "nuisance" and never a real threat."The Air Force also clarified that the malware was not a keylogger, but...

U.S. Drone Fleet Infected with Malware

A keylogging virus has infected the computers that control U.S. Predator and Reaper drones."The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not preve...

Siege Warfare in the Cyber Age

When people hear the words "cyber war," they've been conditioned to think of national secrets being stolen and catastrophic damage to vital public infrastructure. Over recent months many technical d...

Nexpose 5 Goes After Virtual Security

  As applications increasingly move to virtualized environments, the need for security solutions that examine virtual applications continues to grow. Security ...

Trend Micro Endpoint Security Review

Trend Micro is one of the "big four" business endpoint security vendors, along with Symantec, McAfee and Kaspersky. Its offering comes in two versions: a standard one, calle...

Microsoft MMC How To: Hardening Desktops for Improved Security

In many-layered defense approaches, you will find a hardened desktop somewhere in the architecture. Many security experts consider the hardened desktop a necessity but it c...

Latest articles