Trends

Get expert insights on the latest developments in cybersecurity to stay ahead of the curve.

  • Tips and Tricks for Using 802.1X in Windows

    Does your network use the 802.1X port-based access method for authentication on the wired and/or wireless side? If so, you know it takes a bit more than just plugging into an Ethernet port or entering an encryption key to connect to the network. On each client, you must configure the smart card, certificate, or PEAP…


  • Two Approaches to Securing Autorun and AutoPlay in Windows

    Way back when, Microsoft opted for convenience over security and Windows users have been sitting ducks ever since. I’m speaking of autorun/autoplay, a feature in Windows that lets programs run automatically when a CD or USB flash drive is inserted into a PC. For years now bad guys have been exploiting this to automatically infect…


  • Sandboxie: Blocking Web-Based Malware From Your PC

    There is no safe neighborhood anywhere on the Internet. Even honest reputable sites, such as The New York Times, can inadvertently serve up malware. If you don’t keep all the software on your computer patched with the latest bug fixes, you are constantly at risk – malware exploits known bugs to install itself. Now that…


  • Consider Linux for Secure Online Banking

    Do you make online financial transactions from a Windows computer? If so, you may want to re-visit that decision. It’s a given that almost all malicious software targets Windows. In my opinion, while it is possible to secure a Windows computer, the process is too hard, too time-consuming and/or technically over the head of most…


  • Are Chinese Hackers Attacking Your PC?

    Two things happened last Tuesday that, taken together, point out just how dangerous the Internet is. Cyber security was all over the news as Defense Secretary Robert Gates approved the creation of a new department in the U.S. government, called U.S. Cyber Command, to handle the security of computer networks run by the Department of…


  • RBS WorldPay Data Breach Hits 1.5 Million

    A hacker got into the computer systems of electronic payment processing services provider RBS WorldPay, compromising more than a million customers’ records. Formerly known as RBS Lynk, RBS WorldPay, which claims it has more than 20 years in the business, is the U.S. payment processing arm of The Royal Bank of Scotland Group. Personal and…


  • 40 Open Source Tools for Protecting Your Privacy

    You don’t need to fork over big bucks – or even any bucks – to keep your online activities and identity secret. The open source community has dozens of privacy-related projects in development, and some of them have already proven themselves to be among the best privacy protection tools available. These tools are targeted at…


  • 10 Commercial Open Source Security Vendors

    Can companies make money by selling a product customers can get for free? Absolutely, yes. According to IDC, organizations spent $1.8 billion on stand-alone open source software in 2006, and IDC projects that total revenues in this market will reach $5.8 billion by 2011. Eager to get in on that action, a number of software…


  • Spoofing Googlebot

    It crawls the Web without malice seeking out every possible bit of content. It’s name is Googlebot, and sometimes it gets to see things on the Web that the rest of don’t. Unless of course you pretend to be Googlebot. Superficially spoofing Googlebot, Google’s Web crawler, is not a difficult thing to do and was…


  • Linux vs. Windows: Which is Most Secure?

      Editor’s Note: A lot has changed since this article was written so we decided to take another look at the topic. Check out the new article, Is Linux Really More Secure than Windows?, to see what the findings are … you might be surprised (or not). I’m more secure on Linux than I am on…


Top Cybersecurity Companies

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis