Enterprises increasingly worry that their employees may be more willing to steal data or sell insider knowledge because of the …
China becoming the world’s malware factory
With China's economy cooling down, some of the country's IT professionals are turning to cybercrime, according to a Beijing-based security …
Establishing End to End Trust
It is not an overstatement to say that the Internet has transformed the way we live. Social networking represents the …
Koobface worm to users: Be my Facebook friend
A worm that hit Facebook last December has resurfaced, a security researcher said today, and is now hijacking user accounts …
Hackers exploit unpatched Adobe Reader bug
Hackers have been exploiting a critical bug in Adobe Reader, the popular PDF-viewing software, for at least nine days, researchers …
9 Dirty Tricks: Social Engineers’ Favorite Pick-Up Lines
What the average guy might call a con is known in the security world as social engineering. Social engineering is …
The promise of information cards
UAE authorities recently announced they had broken up an international Internet data-smuggling ring suspected of hacking into the credit network …
With global effort, a new type of worm is slowed
There have been big computer worm outbreaks before, but nothing quite like Conficker . First spotted in November, the worm …
Don’t be a data loss victim
Somebody was siphoning customer financial data from a chain of gas station/convenience stores. The perpetrator covered his tracks so well …
Are you prepared for war?
Granted, a degree of hyperbole might exist in the above statements but then again it is not entirely far from …
Heartland data breach could be bigger than TJX’s
A data breach disclosed Tuesday by Heartland Payment Systems may well displace TJX Companies' January 2007 breach in the record …
Top 25 software screw-ups
Most IT security woes, from software patching to cyberespionage and cybercrime, can be traced to the devastating effects wrought by …
Tracking indentities
A common misconception concerning network security is that the enterprise network is at considerable risk from external attackers only. In …
Symantec report reveals booming underground economy
Symantec has released its “Report on the Underground Economy” and it details an online underground economy that has matured into …
Firefox extension blocks dangerous Web attack
‘NoScript’ is a small application that integrates into Firefox. It blocks scripts in programming languages such as JavaScript and Java …
Fortinet debuts database vulnerability assessment appliance
The FortiDB-1000B appliance is a mid-enterprise product designed to “harden” databases by detecting weaknesses in passwords, access privileges and configuration …
Fighting threats on every front
The threats to a corporation's security are changing so quickly that it is difficult to determine what steps are required …