- Welcome Guest
- Sign In
With the constantly evolving Internet security threatscape, being able to actually get a grasp on the latest threats, let alone arm oneself against them, can seem overwhelming. While there are seemingly limitless best practices in regard to cybersecurity, below are several that should help reduce t...
The current threatscape, as with any landscape, can be viewed as endless vistas of changing complexities and unfathomable permutations of technologies, network topologies, risk scenarios and user requirements. It's the white noise of this dizzying array of technologies -- built upon an operating sys...
Cybercrime is pervasive, pandemic and increasingly connected with other parts of the criminal ecosystem. It ranges from the theft of an individual's identity to the complete disruption of a country's Internet connectivity due to a massive attack against its networking and computing resources. This i...
Yet more Web security flaws have emerged to threaten Internet users, who are already bedeviled by the likes of drive-by attacks, SQL injections and spam. At the Black Hat security conference in Las Vegas, researchers reportedly demonstrated serious flaws in the Secure Sockets Layer encryption protoc...
Thursday marked yet another chapter in the short, rocky history of Mozilla's Firefox 3.5 browser, as the foundation released a security update a little more than two weeks after unveiling it. Firefox 3.5.1 fixes a JavaScript vulnerability in version 3.5 that exposed users to so-called drive-by attac...
Describing cyberterrorism as a "weapon of mass disruption," President Barack Obama released in late May the findings of a 60-day cybersecurity review. The statistics told the ugly story: Last year alone, cybercriminals stole intellectual property from businesses worldwide worth up to $1 trillion. In...
The month of June saw a host of Web-based attacks compromising legitimate Web sites. One, dubbed "Nine Ball," compromised more than 40,000 Web sites. Another attack injected a malicious script into large numbers of legitimate sites. Victims who access such tainted Web sites are infected with malwar...
Microsoft has warned Web surfers that an unused ActiveX control in Internet Explorer could let hackers launch malicious code on the user's system if it's running an older OS like Windows XP or Windows Server 2003. Hackers have reportedly already begun exploiting the vulnerability, and security exper...
For years, China's government has kept the country's Internet surfers on a very short leash. Censors attempt to block any content considered immoral, which could be anything from pornography to politically charged blog posts. Its latest plan is to order the installation of filtering software directl...
We all remember Sarah Palin. Like many, I too got excited about the difference she would bring to the 2008 U.S. presidential campaign. She showed well at events, and she looked good on paper. Then came her interviews, and suddenly she was the new Dan Quayle -- or, basically, another person who trade...
Google on Thursday revealed Chrome 2.0, a purportedly faster and more feature-filled version of the search giant's Web browser. The extra speed comes from an update to its V8 JavaScript engine and from a new version of the open source WebKit rendering engine. However, Chrome's speed advantage may so...
With the Congressional Oversight and Government Reform Committee taking a fresh look at the privacy and security risks posed by using LimeWire and other peer-to-peer file-sharing applications, now is a good time for both home and office users of these services to reassess the safety of their own sen...
Panda Security on Wednesday released a cloud-based antivirus solution in beta. Panda Cloud Antivirus is based on a new protection model that utilizes a thin-client agent and server architecture to process and block malware. The product provides full protection from viruses, spyware and rootkits for ...
Two recent developments have all but guaranteed Twitter's successful crossover into the mainstream: First, the popular social networking site -- and its bluebird logo -- are included in a new Sprint national television ad campaign. Secondly, the network was the target of computer worm attacks appare...
On Tuesday, computers infected by the Conficker worm woke up and downloaded a new variant. Named "Worm.Downad.E" by Trend Micro, "Conficker.AQ" by antivirus vendor Eset and "Trojan-Dropper.Win32.Kido.o" by antivirus vendor Kaspersky Labs, this new variant has left many security threat researchers be...