Get real about your security risks

November 01, 2011
IT security departments and business management need to approach risk management realistically
Read more »

Malware loves Windows Task Scheduler

October 25, 2011
More malware is using Windows Task Scheduler to do its dirty work. Here's how to mitigate this surprising attack vector
Read more »

Crypto is cracked: How not to fall in

October 18, 2011
Security admins need to stay ahead of vulnerabilities in the most reliable cryptography technologies, from HTTPS to AES
Read more »

Lesson from Apache flaw: Test everything

October 11, 2011
Apache Server hole, unpatched until last week, shows importance of vulnerability testing for all software, not just code your developers write
Read more »

Now that SSL has been cracked, watch out

October 04, 2011
Organizations can ignore the BEAST attack against SSL today, but the tools behind the exploit will only continue to evolve
Read more »

Typosquatting hacks: Finger slips sink ships

September 27, 2011
Using bogus domains, cyber criminals can intercept messages containing sensitive personal and proprietary information
Read more »

Why hackers don't need to be smart

September 20, 2011
Cyber criminals have used the same technologies and tactics for years, but companies keep failing to defend against them
Cyber Crime
Read more »

The cost of bad security is higher than you think

September 13, 2011
With millions of dollars being plundered via the Internet daily, the CXOs of the world need to reassess the value of IT security
Read more »

The Morto worm threat: Use it to improve your security

September 06, 2011
The password-guessing worm is a reminder that IT needs to take a proactive, big-picture approach to defending the network
Read more »

You're only as secure as your business partners

August 30, 2011
Before you grant access to your network, make sure the third party's security policies won't put you at risk
Read more »
©1994-2014 Infoworld, Inc.