Spoiler alert: Your TV will be hacked

April 17, 2012
With rising popularity of Internet-enabled TVs, the usual array of attacks and exploits will soon be coming to a screen near you
Read more »

Did the Mac malware wake-up call fall on deaf ears?

April 16, 2012
Many Mac users still refuse to understand what the successful Flashback attack really means. Here's a rational response to their objections
Read more »

Malware wake-up call for Mac users

April 13, 2012
The Flashback threat represents new phase in Mac malware -- one that follows the surging popularity of the Mac platform
Read more »

Data security in a BYOD world

April 10, 2012
Sure, you'd like every mobile device in your organization to be securely managed -- but it's not going to happen. Here's how to deal with unmanaged devices
Read more »

If you do the cyber crime, expect to do the time

April 03, 2012
Hackers, bot operators, and spammers beware -- the law has finally caught up with cyber criminals
Read more »

What to monitor to stop hacker and malware attacks

March 27, 2012
Most organizations under attack have no clue they're being targeted. Here are security events to look for in case of a breach
Read more »

How to defeat the new RDP exploit -- the easy way

March 20, 2012
As long as you're installing the patch for the RDP exploit, consider using nondefault port assignments for added security across the enterprise
Read more »

5 big security mistakes you're probably making

March 13, 2012
Companies get hacked so often you'd think it was magic, but it really stems from chronic inability to follow basic security
Read more »

The 19 most maddening security questions

March 06, 2012
Users and organizations alike continue to make the same mistakes and use the same unreliable technologies and practices
Security
Read more »

Defeating hackers and malware with disorder

February 28, 2012
Security company Vigilant leverages the laws of probability to detect maliciousness in data and on machines
Read more »
©1994-2014 Infoworld, Inc.