Mobile security fails the history lesson

December 20, 2011
Hackers use the same attacks against mobile devices they've yielded against PCs, yet we've learned nothing
Read more »

How to deny DDoS attacks

December 13, 2011
Hackers use sophisticated tactics to overwhelm networks, both as tools of protests and as ruses to distract from serious crimes
Read more »

When will we take back our privacy?

December 06, 2011
The more willing we are to hand over our personal information, the more readily businesses and the government will abuse it
Read more »

Doomed by default passwords

November 29, 2011
Recent hacks reveal that admins and vendors have fallen behind on protecting legacy systems
Read more »

Defeat dreaded pass-the-hash attacks

November 22, 2011
Perfect security is elusive, but companies can take key steps to keep malicious hackers from taking over their systems
Read more »

Old Java versions breed new security exploits

November 15, 2011
You may be tempted to keep various versions of Java running on your systems, but doing so leaves you exposed to security threats
Read more »

Sloppy certificate authorities put on notice

November 08, 2011
In the wake of GlobalSign, Comodo, and DigiNotar attacks, Microsoft, Mozilla, and Opera revoke untrustworthy certs
Read more »

Get real about your security risks

November 01, 2011
IT security departments and business management need to approach risk management realistically
Read more »

Malware loves Windows Task Scheduler

October 25, 2011
More malware is using Windows Task Scheduler to do its dirty work. Here's how to mitigate this surprising attack vector
Read more »

Crypto is cracked: How not to fall in

October 18, 2011
Security admins need to stay ahead of vulnerabilities in the most reliable cryptography technologies, from HTTPS to AES
Read more »
©1994-2014 Infoworld, Inc.