- Welcome Guest
- Sign In
When you buy a PC, chances are darn good that the service package will be neither very convenient nor inexpensive. Most in-home or in-office service plans amount to little more than a local repair shop guy traipsing through your front door on a first-available basis. Even carting the computer to an...
Aberdeen research shows that firewalls, VPNs, antivirus, antispam, intrusion prevention, and Web content filtering solutions are deeply penetrated in organizations of all sizes. Management of this portfolio of independent solutions can be time-consuming, costly and inefficient. An upcoming Aberdeen ...
Call it proof that no one's above the common malware attack: NASA's own International Space Station laptops fell victim to an infection attempt, the space agency has revealed. The bug was caught and stopped before any damage was done, but the incident is raising awareness of just how easily harmful ...
Microsoft's August Patch Tuesday security update was a whopper. The software maker released 11 fixes for 26 vulnerabilities, six of which are critical. The remainder were classified as important. The batch of patches was the largest security update from the software company in two years. While 26 vu...
The 2008 Summer Olympics kicked off in Beijing Friday, and this year's Summer Games will serve up highlights outside of athletic prowess and national pride. China's hosting of this year's Games has made them a flash point for a wide range of issues having to do with China and international relations...
Microsoft will begin sharing technical details with security partners about vulnerabilities addressed in its monthly security updates, known as "Patch Tuesdays," the company announced Tuesday. The move, according to the company, was prompted by a growing but undesirable trend associated with Patch T...
Computer forensics gave Michael Fiola his life back. Fiola is the former investigator with the Massachusetts Department of Industrial Accidents who found himself summarily dismissed after an IT check uncovered pornographic images of children on his laptop's hard drive. Criminal charges followed. It ...
We're facing a Web security gap. The Web has become the primary source of infections in enterprises, surpassing e-mail. Although most enterprises do some form of URL filtering on their Web traffic, it's proven to not be an adequate security solution alone. Only 15 percent of organizations are perfor...
Web security firm Finjan issued a warning Thursday about a new wave of mass Web attacks that it said has affected more than 1,000 Web site domains, including government, retail, healthcare and advertising sites. Security vendors have been aware of the attack toolkit, dubbed "Asprox," for several yea...
The presidential campaign is turning a focus to cyberterrorism. Democrat Barack Obama has unveiled plans for a "national cyber advisor" position as well as updated standards for protecting computer-based infrastructures if he is elected. John McCain, the presumptive Republican nominee, has spoken of...
If one were to look for sure bets in the online world, phishing would be right up there on the growing list of security concerns. The art of phishing has been a remarkable study in technology innovation. It started as a simple means of luring unsuspecting consumers to visit bogus Web sites to captur...
It's been on the radar of USA Credit Union's IT department for three years. They all knew about it. They were watching it every day. They had also heard rumblings that more and more of their industry counterparts had fallen victim to the attackers, said Daniel Schneider, the credit union's senior ma...
Months after arresting a man for having child pornography images on a state-issued laptop, prosecutors dropped the charges when a defense-sponsored forensic investigation showed that a poorly configured laptop that had become riddled with malware was to blame. The victim -- besides the children in t...
Malware has yet to plague smartphones to anywhere near the extent it has PCs, but it's only a matter of time before cyber-criminals start targeting mobile networks. ESET, developer of the NOD32 antivirus solution for PCs and computer networks, is the latest IT security specialist to enter the fray.
Despite their discovery of a direct link to the funding sources behind the infamous Storm Virus, IronPort Systems researchers are doubtful law enforcement will ever nail the perpetrators. Still, improving technologies may help to block its continuing spread. In its latest Security Trends Report, rel...