Should you worry about memory-only malware?

February 04, 2014
Some malware disappears when you reboot, but returns if you haven't plugged the hole where it came in. Is this scourge worse than others?
Read more »

13 tough questions about computer security

January 28, 2014
Security novices often ask great questions, and these student queries elicit responses worth a short security course
Read more »

Patching has failed, so it's time for Java to go

January 22, 2014
Oracle pushes out Java patches promptly, but organizations don't install them; wholesale removal of Java is the only sensible answer
Read more »

NSA's backdoors are real -- but prove nothing about BadBIOS

January 14, 2014
NSA hacks are consistent with security researcher Dragos Ruiu's claims about BadBIOS, but too many questions persist
Security
Read more »

Should you switch to a supersecure operating system?

January 07, 2014
Qubes, a Linux OS, uses Xen to spawn multiple domains and promises to reduce risk with some extra effort. For most of us, the effort would be better spent elsewhere
Read more »

To detect 100 percent of malware, try whitelisting 'lite'

December 31, 2013
Few want to live with whitelisting's overhead and restrictions -- so run it in audit mode to detect all malware coming your way
Read more »

Lucky 2013: Count these 5 security blessings

December 23, 2013
Amid a spying scandal and endless corporate data breaches, blessings might seem in short supply. But these five bright spots will cheer you up
Read more »

Where pass-the-hash attacks could be hiding

December 17, 2013
Windows computer and service accounts, as opposed to user accounts, can be especially vulnerable to hash theft. Here's how to reduce the risk
Security
Read more »

Zero-day exploits: Separating fact from fiction

December 10, 2013
You may be surprised by the number and availability of zero-days, but that's no reason to let an attack catch you unprepared
Read more »

7 essentials for creating a greenfield environment

December 03, 2013
Perhaps your network is so badly compromised or bedraggled that you need to start from scratch. Here's how to go about it
Read more »
©1994-2014 Infoworld, Inc.