Archives: December 2013

To detect 100 percent of malware, try whitelisting 'lite'

December 31, 2013
Few want to live with whitelisting's overhead and restrictions -- so run it in audit mode to detect all malware coming your way
Read more »

Lucky 2013: Count these 5 security blessings

December 23, 2013
Amid a spying scandal and endless corporate data breaches, blessings might seem in short supply. But these five bright spots will cheer you up
Read more »

Where pass-the-hash attacks could be hiding

December 17, 2013
Windows computer and service accounts, as opposed to user accounts, can be especially vulnerable to hash theft. Here's how to reduce the risk
Security
Read more »

Zero-day exploits: Separating fact from fiction

December 10, 2013
You may be surprised by the number and availability of zero-days, but that's no reason to let an attack catch you unprepared
Read more »

7 essentials for creating a greenfield environment

December 03, 2013
Perhaps your network is so badly compromised or bedraggled that you need to start from scratch. Here's how to go about it
Read more »
©1994-2014 Infoworld, Inc.