Operation clean sweep: How to disinfect a compromised network

February 18, 2014
You can't remove every bad scrap, but due diligence can go a long way toward yielding a clean, reliable network
Read more »

How to land a job in IT security

February 11, 2014
To be a security pro, decide on a specialization, then learn as much as you can through formal channels or by self-education
Read more »

Should you worry about memory-only malware?

February 04, 2014
Some malware disappears when you reboot, but returns if you haven't plugged the hole where it came in. Is this scourge worse than others?
Read more »

13 tough questions about computer security

January 28, 2014
Security novices often ask great questions, and these student queries elicit responses worth a short security course
Read more »

Patching has failed, so it's time for Java to go

January 22, 2014
Oracle pushes out Java patches promptly, but organizations don't install them; wholesale removal of Java is the only sensible answer
Read more »

NSA's backdoors are real -- but prove nothing about BadBIOS

January 14, 2014
NSA hacks are consistent with security researcher Dragos Ruiu's claims about BadBIOS, but too many questions persist
Read more »

Should you switch to a supersecure operating system?

January 07, 2014
Qubes, a Linux OS, uses Xen to spawn multiple domains and promises to reduce risk with some extra effort. For most of us, the effort would be better spent elsewhere
Read more »

To detect 100 percent of malware, try whitelisting 'lite'

December 31, 2013
Few want to live with whitelisting's overhead and restrictions -- so run it in audit mode to detect all malware coming your way
Read more »

Lucky 2013: Count these 5 security blessings

December 23, 2013
Amid a spying scandal and endless corporate data breaches, blessings might seem in short supply. But these five bright spots will cheer you up
Read more »

Where pass-the-hash attacks could be hiding

December 17, 2013
Windows computer and service accounts, as opposed to user accounts, can be especially vulnerable to hash theft. Here's how to reduce the risk
Read more »
©1994-2014 Infoworld, Inc.