Search Results | Malware
PREV 1...10   20   30...36   37   38   39   40   41   42   43   44   45...   50   60   70...77 NEXT
Sort by:  Most Relevant  |  Date
Charting the vendor landscape for web and email security

Blog  Today's threat landscape is complex. Hackers no longer lust for fame, rather looking for ways to make their fortune. Simple exploits, such as a malicious email sent en masse, are no longer effective. This means that they have turned their hands to more sophisticated attacks, often highly targeted at...

Last updated: Feb 1, 2011   10:37 AM GMT  |  Blog: Bloor Security   |      Uncategorized
Two examples of real information warfare hacking

Blog   It's important to remember what we mean when we talk about hacking these days. Hacking has many positive connotations and is often used hand-in-hand with the term 'mashup'. Coders using APIs relating to popular web services to provide new incremental layers of user functionality is, of course, hack...

Last updated: Nov 4, 2011   11:51 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
What can software application developers expect from InfoSec?

Blog  The InfoSecurity Show 2012 is on next week at London's glittering Earl's Court. The collective PR machine driving vendors' appearances at the show has been just a little wearisome, with very few clients taking the trouble (so far) to drill down into the real "what it means to you" element for pract...

Last updated: Apr 20, 2012   4:14 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Credit union warns of phony banking Android app

Blog  Mobile banking app tries to gain access to financial data. App removed from Android marketplace. In what could be one of the first signs that attackers are testing smartphones as another way to gain access to sensitive information, a Beaverton, Oregon credit union is warning its customers about a r...

Last updated: Jan 11, 2010   2:09 PM GMT  |  Blog: Security Bytes
Are we more secure seven years later?

Blog  One of the after effects of the terrorist attacks of Sept. 11, 2001, was a hyper-awareness of security of both our physical and digital environments. This has translated into the creation of new government agencies (DHS, TSA), rafts of legislation and billions of dollars of venture capital investmen...

Last updated: Sep 11, 2008   7:38 PM GMT  |  Blog: Security Bytes
Cyber Security Checklist For Every Business and Enterprises

Blog  Cyber threats are increasing in a larger fashion. That calls for a higher scale of cyber security irrespective of the size of the business. Of course, data security is of prime importance for any business. Creating a security positive culture in your organization while you are scaling up in terms of...

Last updated: Aug 29, 2017   5:35 PM GMT  |  Blog: Quality Assurance and Project Management   |      Cyber security
We must be careful about what we do on the internet: Part 1

Blog  As a network admin at Antonelli College, one of my duties is making sure that the students are fully briefed on safe browsing practice. It's always nice when one of their peers gives us a hand. Hunter Mitchell, a student worker at the Hattiesburg, Mississippi campus came up with a very good summary ...

Last updated: Aug 20, 2012   2:54 AM GMT  |  Blog: Security Corner
The trouble heading for your business in 2013

Blog   Facebook, Twitter, Apple and Microsoft: all icons of the information technology industry and all the focus for targeted attacks in Feb 2013. The bad news for us all is, that even those that should be some of the most tech-savvy companies in the world, can fall foul of targeted attacks.   Mic...

Last updated: Mar 1, 2013   1:39 PM GMT  |  Blog: Quocirca Insights   |      Apple, Business, Facebook
Rule of 'Thumb': You're Going to Lose Them

Blog  To anybody who's run a USB memory stick through the laundry or left one sitting in a remote machine, there's no surprise in the results from therecent Ponemon Institute study, The State of USB Drive Security. Ponemon, which performed the study on behalf of Kingston, a manufacturer of encrypted USB...

Last updated: Aug 14, 2011   0:47 AM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery
ThreatQuotient ups the ante for dealing with security incidents

Blog  ThreatQuotient ups the ante for dealing with security incidents The hardware and software that constitutes the average organisations IT infrastructure records millions of events a day which are recorded in log files. This is known as machine data. Nearly all such events are benign and of little ...

Last updated: Apr 10, 2018   2:51 PM GMT  |  Blog: Quocirca Insights
Risk appraisal and acceptance process

Blog  Today I've been trying to participate in a meeting where everyone except me is sitting in a building in Orlando. Unfortunately, for various reasons I wasn't able to travel over this week so it's a case of straining to join in the discussion in the right place over the telephone and make the right co...

Last updated: Feb 27, 2007   0:01 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Risk assessment
Strong (and aerobically fit) authentication

Blog  Here's an intriguing security scenario for you. Imagine you use your right hand to unlock your iPhone or tablet and you wear your fitness tracker or smartwatch on your right wrist. Now imagine that someone who really wants to get access to information on your mobile devices is somehow able to use th...

Last updated: Mar 20, 2017   8:01 PM GMT  |  Blog: IoT Agenda   |      Authentication, biometric, Internet of Things
A report from the Eskenzi PR 2013 IT Security Analysts and CISO Forum

Blog   At the recent IT Security Analysts Forum in London, organised by Eskenzi PR, one could be forgiven for thinking that the dozen or so vendors represented were all fierce competitors. Their high-level taglines all sounded pretty similar; "we secure your business's data", "our product is the next gene...

Last updated: Jul 10, 2013   9:33 AM GMT  |  Blog: Quocirca Insights   |      Security
People Still Poke USB Sticks In Things, Researchers Find

Blog  It turns out that the reason people keep poking USB sticks into things isnt necessarily because theyre stupid. Its because theyre nice. A recent study by researchers at the University of Illinois discovered that almost half of the people who found USB sticks scattered by the researchers...

Last updated: Apr 25, 2016   3:57 AM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery   |      Security
Apple's Mountain Lion OS X: 100 New Features

Blog  Apple has released the ninth major release of its OS X operating system to developer preview stage. Continuing the big cat family naming tradition, Mountain Lion will introduce Messages, Notes, Reminders and Game Center to the Mac, as well as Notification Center, Share Sheets, Twitter integration an...

Last updated: Feb 17, 2012   4:27 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Camino web browser, for Mac open source purists only?

Blog  Camino is an open source web browser for Mac OS X users that requires Mac OS X 10.4 or later. If you've never heard of it, then you should at least know that it has been around since 2002 and it has a special 'Safari migration' area on its website to encourage users to make the switch. So what, you...

Last updated: Mar 27, 2011   12:50 AM GMT  |  Blog: Open Source Insider   |      Uncategorized
Microsoft Security Intelligence Report v10

Blog  Microsoft recently released Microsoft Security Intelligence Report v10. The report aggregates relevant computer and network security data from more than 600 million PCs across 117 countries--providing a comprehensive look at the threat landscape. A Microsoft On The Issues blog posts describes some ...

Last updated: May 25, 2011   3:47 PM GMT  |  Blog: The Security Detail
How to Run Software in a Virtual Sandbox

Blog  We all know that virtual computing is all the rage lately. I have been using virtual computing in one form or another for over 10 years now. The concept makes since especially with today's powerful servers. There are many reasons that visualization is attracting more customers. For me, one big d...

Last updated: Aug 24, 2010   3:06 AM GMT  |  Blog: Can you hear me now? Tales from a Cisco voice instructor
Fake Microsoft security bulletin circulating

Blog  The folks at the SANS Internet Storm Center are warning of a fake Microsoft security bulletin that's making the rounds. Here's what it looks like: Microsoft Security Bulletin MS06-4 Cumulative Security Update for Internet Explorer (113742734) Published: June 3, 2007 Version: 1.0 Summary Who should...

Last updated: Jun 8, 2007   9:58 AM GMT  |  Blog: Security Bytes
Fighting click fraud with premium clicks

Blog  As the effectiveness of online ads has continued to grow, so has the problem of click fraud. Criminals discovered some time ago that botnets make especially efficient means for perpetrating large-scale click fraud schemes, and they have been refining their techniques for years. Syndicators and onlin...

Last updated: Aug 9, 2007   1:48 PM GMT  |  Blog: Security Bytes
PREV 1...10   20   30...36   37   38   39   40   41   42   43   44   45...   50   60   70...77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: