Quantcast
Channel: Computerworld - Stories by George V. Hulme RSS feed
Browsing latest articles
Browse All 11 View Live

Malvertising continues to pound legitimate websites

In the last three months of 2010 attackers managed to serve 3 million malicious advertising, or malvertising, impressions every day. That's the headline figure from a report released today from Web...

View Article



Industry association aims to bolster SCADA security

It's no state secret that industrial and automation control systems have a way to go before they're resilient from targeted and sophisticated malware attacks. Just last week the International Society...

View Article

Proofpoint moves into mobile mail security

There's no doubt that the momentum in computing adoption is with mobile meaning enterprises will have to protect the communications that emanate from, and are sent to, these devices.

View Article

Customized, stealthy malware growing pervasive

It's no secret that the goal of modern malware writers is to create attack software that is stealthy and flows undetected for as long a period of time as possible. What's increasingly startling,...

View Article

SCADA security arms race underway

While the race between industrial control system attackers and defenders didn't start with the Stuxnet worm, it certainly acted as a catalyst to a new arms race and more researchers taking a closer...

View Article


They're back! Data breach notification bills resurface

After several large breaches -- including the Epsilon, Sony, and Citigroup incidents that left customer financial data exposed -- federal lawmakers are dusting the covers off of an old idea: national...

View Article

Mac OS X Lion: Losing its security pride

The past couple of weeks have not been the best for Mac OS X's security reputation.

View Article

In Pictures: 10 tips to secure your iPhone

No more is it enough to think that securing your iPhone with a simple 4 digit PIN is adequate.

View Article


Six failings common to entry-level cyber security job seekers

When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that's not as easy as it may seem.

View Article


Six entry-level cybersecurity job seeker failings

When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that's not as easy as it may seem.

View Article

DDoS protection, mitigation and defense: 7 essential tips

Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.

View Article
Browsing latest articles
Browse All 11 View Live




Latest Images