Endpoint Protection

Endpoint Protection news, information, and how-to advice

mobile security

One week after patch, Flash vulnerability already exploited in large-scale attacks

The Fiesta exploit kit bundles an exploit for the CVE-2014-0569 vulnerability in Flash Player, researchers found


Data center security in the cloud.

5 techniques for securing your enterprise data

The pros and cons of new techniques and tools, such as cloud access security brokers, adaptive access control and pervasive sandboxing

Microsoft Security Essentials may be throwing false positives for Trojan:DOS/Alureon.J

The precise circumstances are unclear, but it's becoming obvious that MSE in some cases detects a DOS/Alureon.J infection where none exists

security target

Create your own 'dirty dozen' threat list

Which security events should you worry about most? Everyone has different vulnerabilities, so here's how to prioritize

So long, iOS -- jailbreakers have found their home: Android

Jailbreakers deserve the malware infections they get, which is why they're moving to Android's 'malware is the norm' world

Symantec patches privilege escalation flaws in Endpoint Protection

Exploit code for the flaws was posted online after Symantec released the patches

Most USB thumb drives can be reprogrammed to infect computers

The firmware in such devices is unprotected and can be easily overwritten by malware, researchers from Security Research Labs said

No patch yet for zero day in Symantec Endpoint Protection software driver

Symantec has published recommendations for mitigating the danger

Many antivirus products are riddled with security flaws

Antivirus products increase a computer's attack surface and may even lower an operating system's protections, a security researcher claims

3 zero-day flaws found in Symantec's Endpoint Protection

Security vendor Offensive Security says the flaws could be used to gain full system access

11 signs you've been hacked -- and how to fight back

Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned

Two glimmers of hope for enterprise security

Will the endless stream of security compromises ever stop? No single security product can deliver salvation, but two new solutions, PingID and Tanium, show real promise

Your device, your data: Don't let IT screw up your iPhone or iPad

Even if your company wipes your device, you don't have to lose any of your precious info

Microsoft fixes flaw in its security software

Successful exploit of the vulnerability would have left PCs wide open to attack

ISPs should quarantine infected computers, researchers say

Forcing users to clean their infected computers on an ongoing basis would be more disruptive to cyber criminals than botnet takedowns

Mobile and PC management: The tough but unstoppable union

One day, you'll manage all client devices from a central policy console, but it won't be a fast or easy journey

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling

New online banking Trojan combines Zeus and Carberp features

The malware, dubbed Zberp, targets customers of 450 financial institutions, security researchers from Trusteer said

5 ways computer security has truly advanced

Security isn't all gloom and doom. Amid the progress today, these four developments in particular have made us safer

Load More