Now that SSL has been cracked, watch out

October 04, 2011
Organizations can ignore the BEAST attack against SSL today, but the tools behind the exploit will only continue to evolve
Read more »

Typosquatting hacks: Finger slips sink ships

September 27, 2011
Using bogus domains, cyber criminals can intercept messages containing sensitive personal and proprietary information
Read more »

Why hackers don't need to be smart

September 20, 2011
Cyber criminals have used the same technologies and tactics for years, but companies keep failing to defend against them
Cyber Crime
Read more »

The cost of bad security is higher than you think

September 13, 2011
With millions of dollars being plundered via the Internet daily, the CXOs of the world need to reassess the value of IT security
Read more »

The Morto worm threat: Use it to improve your security

September 06, 2011
The password-guessing worm is a reminder that IT needs to take a proactive, big-picture approach to defending the network
Read more »

You're only as secure as your business partners

August 30, 2011
Before you grant access to your network, make sure the third party's security policies won't put you at risk
Read more »

Google's stealth updates: Why no one else gets away with it

August 23, 2011
How has Google managed to get users to accept its patches while other software vendors' updates are ignored or condemned?
Read more »

No contest: Mac vs. Windows security

August 16, 2011
Cloud computing, mobile technology, and Web 2.0 have altered the debate on whether Microsoft or Apple offers superior security
Read more »

The cyber crime tide is turning

August 09, 2011
Cyber criminals are facing more tech-savvy law-enforcement agents and harsher sentences
Cyber Crime
Read more »

Car hacks loom as autos go wireless

August 02, 2011
Tomorrow's vehicles will communicate wirelessly to reduce accidents, and experts are working to ensure hackers can't abuse the technology
Read more »
©1994-2014 Infoworld, Inc.