Trends

Get expert insights on the latest developments in cybersecurity to stay ahead of the curve.

  • Top Ten Wi-Fi Security Threats

    Gone are the early days of Wi-Fi, when CSOs lost sleep over threats like WEP cracking and war driving. 802.11n products have matured to the point where many enterprises are investing in larger, faster WLANs to support mission-critical applications. And yet, pros know that security is never to be taken for granted. Here, we offer… Read more


  • Online Banking Passwords, Usernames Widely Reused

      The usernames and passwords that are used by individuals for financial Web sites are among the most valuable pieces of information that Internet users possess. Yet according to a new study from security firm Trusteer, they’re also not treated by users with the confidentiality and respect they deserve. The company’s twelve-month study surveyed over… Read more


  • How to: Protect Your Website Using robots.txt, Part 1

    For hackers looking to access passwords, user e-mails, retail transactions, and other private data, one of the most useful tools on the Web is also among the most popular—Google. Armed only with the world’s most popular search engine, and crafty search terms, a Google search can turn up troves of data whose owners are probably… Read more


  • Tips and Tricks for Using 802.1X in Windows

    Does your network use the 802.1X port-based access method for authentication on the wired and/or wireless side? If so, you know it takes a bit more than just plugging into an Ethernet port or entering an encryption key to connect to the network. On each client, you must configure the smart card, certificate, or PEAP… Read more


  • Two Approaches to Securing Autorun and AutoPlay in Windows

    Way back when, Microsoft opted for convenience over security and Windows users have been sitting ducks ever since. I’m speaking of autorun/autoplay, a feature in Windows that lets programs run automatically when a CD or USB flash drive is inserted into a PC. For years now bad guys have been exploiting this to automatically infect… Read more


  • Sandboxie: Blocking Web-Based Malware From Your PC

    There is no safe neighborhood anywhere on the Internet. Even honest reputable sites, such as The New York Times, can inadvertently serve up malware. If you don’t keep all the software on your computer patched with the latest bug fixes, you are constantly at risk – malware exploits known bugs to install itself. Now that… Read more


  • Consider Linux for Secure Online Banking

    Do you make online financial transactions from a Windows computer? If so, you may want to re-visit that decision. It’s a given that almost all malicious software targets Windows. In my opinion, while it is possible to secure a Windows computer, the process is too hard, too time-consuming and/or technically over the head of most… Read more


  • Are Chinese Hackers Attacking Your PC?

    Two things happened last Tuesday that, taken together, point out just how dangerous the Internet is. Cyber security was all over the news as Defense Secretary Robert Gates approved the creation of a new department in the U.S. government, called U.S. Cyber Command, to handle the security of computer networks run by the Department of… Read more


  • RBS WorldPay Data Breach Hits 1.5 Million

    A hacker got into the computer systems of electronic payment processing services provider RBS WorldPay, compromising more than a million customers’ records. Formerly known as RBS Lynk, RBS WorldPay, which claims it has more than 20 years in the business, is the U.S. payment processing arm of The Royal Bank of Scotland Group. Personal and… Read more


  • 40 Open Source Tools for Protecting Your Privacy

    You don’t need to fork over big bucks – or even any bucks – to keep your online activities and identity secret. The open source community has dozens of privacy-related projects in development, and some of them have already proven themselves to be among the best privacy protection tools available. These tools are targeted at… Read more


Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis