Trends

Get expert insights into the latest developments in cybersecurity to stay ahead of emerging threats and evolving technologies. Our in-depth analysis covers everything from new attack vectors and vulnerabilities to cutting-edge security solutions and trends.

  • How Does Biometric Authentication Work?

    Have passwords outlived their usefulness? Take a look at some of the weak passwords exposed in website breaches this year, and judge for yourself. The frequent usage of weak passwords such as “changeme,” “123abc,” and “Pa$$w0rd” (real-life examples uncovered in the recent breach and defacement of a security software vendor’s website) are a strong indicator…


  • Detecting Malicious Traffic in HTTP Headers

    In the battle against malicious traffic and infected websites, security researchers are always looking for new avenues of detection. According to Trustwave Security Researcher Rodrigo Montoro, one such approach could come from an analysis of HTTP headers to detect potentially malicious traffic. Speaking at the SecTOR security conference in Toronto, Montoro detailed his approach toward…


  • Top 10 Fun Facts About iPad Security

      4 Steps to Securing Mobile Devices and Apps in the Workplace. Search the Apple Apps Store for broad gauge iPad antivirus software, or malware killers, and you won’t find much. What you willl find are a few apps, two of which (freebies from McAfee) are created to serve as news alerts about virus threats.…


  • WordPress Gets Clickjacking Protection

    The open source WordPress blogging application is being updated to version 3.1.3 this week adding multiple security fixes and improvements. Among the fixes is a moderately critical patch for arbitrary file upload vulnerability “The application improperly validates uploaded files, which can be exploited to execute arbitrary PHP code by uploading a .phtml file with e.g.…


  • Using Wi-Fi Security on Mobile Phones and Devices

    If your smart phone, Android tablet, or iPad has become a part of your daily business or computing life, you should take its security just as serious as you do with your desktop or laptop computers since mobile devices are so much easier to misplace or become stolen. You could lose all your contacts, calendar…


  • How to Securely Manage Wi-Fi on Smart Phones and Tablets

    Unfortunately, there’s more to mobile security than the data you store. If your mobile device has Wi-Fi capability and you connect to unsecured Wi-Fi hotspots for Internet access without knowing it, there are more security concerns. Even worse, mobile devices don’t incorporate security features to directly combat Wi-Fi threats. The first thing to know is…


  • Top 10 Android Security Risks

    Last year, Android became the world’s second favorite mobile OS, racing past BlackBerry and Apple. 67 million of the nearly 300 million smartphones sold in 2010 were Android-powered devices like the Samsung Galaxy S, Motorola Droid X, and HTC EVO. New Android 3.0 (“Honeycomb”) tablets will spur even more growth this year. As a result,…


  • How to Protect an Entire Network with Untangle

    As you’re likely aware, guarding your PCs from malware – viruses, trojans, spyware – and hacking is crucial for protecting your files and data. However, don’t forget about your mobile devices. Malware and hacking will be becoming more prevalent on smartphones, pads, and tablets. This makes network-wide security protection even more beneficial. It can cover…


  • IronBee Open Source WAF Project Launches

    Web Application Firewall (WAF) technology is seen by manyas a much needed technology for Web application security. In the open source world, the ModSecurity project has helped to lead the charge for WAFs, but there is now a group that is aiming to build a new open source WAF called IronBee. Spearheaded by Qualys security…


  • What the Heck is DNSSEC?

    The Internet runs on DNS. More specifically, DNS (Domain Name System) is the protocol by which machine-friendly 32-bit IPv4 (ex: 74.125.226.145) and 126-bit IPv6 (ex: 2002:4A7D:E291:0:0:0:0:0) addresses are translated into human friendly representations like www.google.com. Paul Mockapetris wrote and implemented the earliest official version of DNS in 1983 and the original specifications were published as…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies