• NTLM security flaws show attackers don’t need latest malware to thrive

    Security flaws in protocols such as NTLM are so easy to exploit that in many cases attackers no longer need the latest and greatest malware.

    Brandan765 pointsBadges:
  • Remove bots from your system — a four-step process

    Kevin Beaver outlines four steps you can take to balttle the bot, malware's most notorious villain.

    Kevin Beaver16,610 pointsBadges:
  • Virtualization security concerns: The threat of hypervisor malware

    What is hypervisor malware, and how worried should enterprises employing virtualization be about it? Threats expert Nick Lewis explains.

    editor13,215 pointsBadges:
  • Proof-of-concepts heighten mobile malware fears

    By themselves, Crossover and RedBrowser are fairly harmless, but they're a sign that the digital underground is likely working toward large-scale attacks against handheld devices.

    SearchCIOMidmarket9,485 pointsBadges:
  • In-the-cloud defenses for mobile malware

    Mobile antivirus programs apply laptop best practices to PDAs and smartphones, but there are many other ways to protect corporate assets from mobile malware. Complementary "in the cloud" defenses include enterprise sync servers, network gateways and wireless services that incorporate mobile malware...

    searchsecurity20,705 pointsBadges:
  • Mobile devices: Corporate security strategies

    According to analysts, companies grappling with mobile/wireless security are expected to take a hit from improper use and mobile malware attacks resulting in real business interruption. Fortunately, most of these exploits will take advantage of vulnerabilities that are identifiable and resolvable....

    searchsecurity20,705 pointsBadges:
  • Is malware coming to a smartphone near you?

    Mobile malware has grown increasingly malicious and financially motivated. In this tip, you'll learn the history of mobile malware and how it can sneak in your back door.

    searchsecurity20,705 pointsBadges:
  • Junipers’ Mobile Threats Report: Mobile malware attacks grew over 600%

    Juniper Networks' third annual Mobile Threats Report reveals mobile malware grew 614% in 2012, most of it aimed at Android users.

    ITKE342,605 pointsBadges:
  • Required: A revamped antimalware strategy

    Increasingly sophisticated malware can divert the attention of IT departments from low-level security gaps. Here’s why you need a strategy that works on all levels.

    searchsecurity20,705 pointsBadges:
  • Microsoft offers guidance to IT in pinpointing sneaky malware

    New tool and documentation helps IT managers dig out malware buried within the OS.

    ITKE342,605 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.