A critical zero-day flaw in Internet Explorer was exploited as part of the attack on Google and other companies, according …
Yahoo reportedly hit by China hackers
Yahoo was one of more than 30 companies hit by a sophisticated online attack from China, designed to steal intellectual …
Yahoo reportedly hit by China hackers
Yahoo was one of more than 30 companies hit by a sophisticated online attack from China, designed to steal intellectual …
Microsoft warns of IE zero-day used in Google Attack
A critical zero-day flaw in Internet Explorer was exploited as part of the attack on Google and other companies, according …
Google Chrome OS may be security hotspot in 2010
Google's Chrome OS will be “poked” by hackers in 2010, in large part because it will be the “new kid …
Adobe will be top target for hackers in 2010, report says
Adobe Systems’ Flash and Acrobat Reader products will become the preferred targets for criminal hackers in 2010, surpassing Microsoft Office …
Adobe will be top target for hackers in 2010, report says
Adobe Systems' Flash and Acrobat Reader products will become the preferred targets for criminal hackers in 2010, surpassing Microsoft Office …
Unmasking DLP
Few security technologies have received as much attention over the past few years as Data Leakage Prevention (DLP) solutions have. …
Network IPS tests reveal equipment shortcomings
An independent test and evaluation of 15 different network intrusion-protection system products from seven vendors showed none were fully effective …
Network IPS tests reveal equipment shortcomings
An independent test and evaluation of 15 different network intrusion-protection system products from seven vendors showed none were fully effective …
Thanksgiving Webcam promo leads to malware
The $10 Webcam that Anna Giesman bought her daughter at Office Depot over the Thanksgiving weekend sounds like one of …
IBM buys database security firm Guardium
IBM has acquired database security vendor Guardium, it said Monday, confirming earlier reports. Terms of the deal were not disclosed. …
China warns about return of destructive Panda virus
A computer worm that China warned Internet users against is an updated version of the Panda Burning Incense virus, which …
China warns about return of destructive Panda virus
A computer worm that China warned Internet users against is an updated version of the Panda Burning Incense virus, which …
Are nations paying criminals for botnet attacks?
Nations that want to disrupt their enemies’ banking, media and government resources don’t need their own technical skills; they can …
Are nations paying criminals for botnet attacks?
Nations that want to disrupt their enemies' banking, media and government resources don't need their own technical skills; they can …
Rivals mock Microsoft's free security software
Although one of the top consumer security vendors welcomed Microsoft's Security Essentials to the market, another dismissed the new free …
Microsoft to ship free security software soon
Microsoft has told beta testers of its free antivirus software that it will release the final version to the public …
Block data leaks at the endpoint
It almost goes without saying that the greatest threat to the security of an enterprise network often comes from within. …
Domain-name abuse proliferates
For legitimate businesses, a domain name is a way to hang a shingle in cyberspace. In the criminal world, domain …