Malvertising continues to pound legitimate websites
In the last three months of 2010 attackers managed to serve 3 million malicious advertising, or malvertising, impressions every day. That's the headline figure from a report released today from Web...
View ArticleIndustry association aims to bolster SCADA security
It's no state secret that industrial and automation control systems have a way to go before they're resilient from targeted and sophisticated malware attacks. Just last week the International Society...
View ArticleProofpoint moves into mobile mail security
There's no doubt that the momentum in computing adoption is with mobile meaning enterprises will have to protect the communications that emanate from, and are sent to, these devices.
View ArticleCustomized, stealthy malware growing pervasive
It's no secret that the goal of modern malware writers is to create attack software that is stealthy and flows undetected for as long a period of time as possible. What's increasingly startling,...
View ArticleSCADA security arms race underway
While the race between industrial control system attackers and defenders didn't start with the Stuxnet worm, it certainly acted as a catalyst to a new arms race and more researchers taking a closer...
View ArticleThey're back! Data breach notification bills resurface
After several large breaches -- including the Epsilon, Sony, and Citigroup incidents that left customer financial data exposed -- federal lawmakers are dusting the covers off of an old idea: national...
View ArticleMac OS X Lion: Losing its security pride
The past couple of weeks have not been the best for Mac OS X's security reputation.
View ArticleIn Pictures: 10 tips to secure your iPhone
No more is it enough to think that securing your iPhone with a simple 4 digit PIN is adequate.
View ArticleSix failings common to entry-level cyber security job seekers
When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that's not as easy as it may seem.
View ArticleSix entry-level cybersecurity job seeker failings
When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that's not as easy as it may seem.
View ArticleDDoS protection, mitigation and defense: 7 essential tips
Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.
View Article
More Pages to Explore .....