Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

strip protector

55% off Tripp Lite Rotatable Outlet Surge Protector Power Strip - Deal Alert

This power strip has a built-in surge protector, 6 rotatable outlets, an extra long 8 foot cord and a USB port for charging portable devices. Currently averages 4.5 out of 5 stars from almost 600 people on Amazon.

apc supply

48% off APC Back-UPS Pro Uninterruptible Power Supply - Deal Alert

The Back-UPS BR1500G offers guaranteed battery backup and surge protection for high performance computer systems, networks, external storage devices, game consoles and other electronics, and is currently offered at a 48% discount.

Apple iPhone 5S (1)

Attackers exploit Apple DRM weakness to infect non-jailbroken iOS devices

If a malicious app is published on the App Store once and then is removed, attackers can continue to infect devices with it through PC malware

closeup of female hand holding red marker checking off list

Make threat intelligence meaningful: A 4-point plan

Threat intelligence is a hot topic, but it requires a ton of work to be operational and effective. Here's how to steer clear of the traps

Why Windows 10? Microsoft stresses security

The new Windows Defender Advanced Threat Protection feature adds more security cred to Microsoft's new OS

ransomware hardware security embedded circuit board integrated controller

New Dell partnership throws doubt on traditional antivirus programs

A Dell executive says most AV products aren't effectively stopping attacks

cancelling an it project

Intel Security will discontinue McAfee SaaS products

Some products will be replaced, but admins will need to start over for setup and configuration

malware threat hack hacked bug cyberthreat

8 ways to fend off spyware, malware, and ransomware

Here are some painless precautions you can follow that might help keep you step ahead of cyber attacks

alert detection prevent hacker hacking2

Hands-on review: Threat intelligence could turn the tide against cyber criminals

We look at security products from ThreatConnect, ThreatStream, Soltra, Arbor Networks, and iSight Partners that leverage the relatively new concept of Threat Intelligence

hacker shirt

For discerning hackers, malware is so last year

Fraudsters rely on legitimate administrator tools instead of malware to successfully breach systems and steal data

virtual apps vm control photo touch finger screens windows

Tanium review: Endpoint security at the speed of now

Tanium Endpoint Platform draws on fast peer-to-peer communications to answer queries of managed clients within seconds

zero balloon

Keep these cyber thug holidays marked on your calendar

Learn these days when cyber thugs attack with even more cunning and fervor, and get ready to respond to related exploitations

security companies to watch

10 more security startups to watch

These startups focus on encryption, endpoint protection event analysis, and radio-frequency scanning

Cisco plans to buy security-as-a-service provider OpenDNS

OpenDNS provides Web filtering and malware protection services to 65 million users

Antivirus doesn’t work. So why are you still using it?

Standalone antivirus can no longer stop the sophisticated barrage of key loggers, backdoors, rootkits, Trojan horses, worms, and spyware

Today's multiheaded malware needs a multipronged solution

By analyzing and predicting process behavior, a new approach to endpoint protection overcomes the limitations of traditional AV detection and sandboxing

prison jail cells law penitentiary security

How to lose customers with excessive security

If your service or product security works like a prison, don't be surprised when users and customers go elsewhere

Apple security checks may still miss iWorm malware

New research says Gatekeeper and XProtect aren't entirely effective in protecting Mac OS X against iWorm malware

Selective wipe: The secret to getting users to report lost mobile devices

Of course smartphones and tablets will contain personal data, so security policies need to protect it, too

One week after patch, Flash vulnerability already exploited in large-scale attacks

The Fiesta exploit kit bundles an exploit for the CVE-2014-0569 vulnerability in Flash Player, researchers found

Load More