IT and Employees See BYOD Security (Much) Differently
IT organizations continue to struggle with the details when it comes to enabling BYOD for applications beyond email, and a new study finds that while employees are eager to access corporate resources...
View Article5 Ways to Stay Safe Online on Black Friday, Cyber Monday
Black Friday and Cyber Monday are two of the busiest online shopping days of the year, and a peak period for malware, phishing and spam. Here are five tips you can share with employees to help protect...
View ArticleOnline Security Basics for Small Business Websites
Everyone on the Web is a target for scams, malware, piracy and a host of other online security dangers. Small business owners are no exception. These tips will help you protect your website, your...
View ArticleTop 12 IT Security Stories of 2012
The holidays are nearly here and 2012 is on the way out. It's time to reflect on some of the most popular security stories and tips of the year as we prepare for 2013.
View ArticleTop 12 Security Slideshows of 2012
As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012.
View ArticleMalware Strikes With Valid Digital Certificate
We rely upon digital certificates and certificate authorities to validate that online entities are who they say they are, but security firm Malwarebytes recently found a banking Trojan with a valid,...
View ArticleGoogle, Microsoft and Others Putting Kibosh on Phishing Emails
A year after Google, Microsoft and other email heavyweights launched the DMARC program to filter out spoofed email that attackers use for phishing, they say an estimated 60% of the world's email boxes...
View ArticleHow ADP and Facebook Battle Bad Email
Each day cyber-criminals around the world manage to unleash untold millions of spoofed e-mails that fake well-known brand names to try and fool victims that receive this fraudulent e-mail into opening...
View ArticleHow to Blunt Spear Phishing Attacks
According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email...
View Article6 IT Security Innovations to Keep You Ahead of Attackers
Hardly a day goes by without a new security threat emerging. Traditional security tools aren't always up to the task of keeping sensitive business information in safe hands. These six innovations will...
View ArticleIRS Uncorks Dirty Dozen Tax Scams for 2013
The Internal Revenue Service today reminded taxpayers that there are plenty of scam artists and cybercriminals that want your money.
View ArticleDHS Warns of Spear-Phishing Campaign Against Energy Companies
The Department of Homeland Security (DHS) has a warning for organizations that post a lot of business and personal information on public web pages and social media sites: Don't do it.
View ArticleTwitter Plans Two-Step Authentication to Prevent Hacks
Following Tuesday's hacking of the Associated Press' Twitter account, the microblogging site is reportedly working on a two-step authentication security solution to help prevent future hijackings.
View ArticleHackers Increasingly Target Shared Web Hosting Servers for Use in Mass...
Nearly half of phishing attacks seen during the second half of 2012 involved the use of hacked shared hosting servers, APWG report says.
View ArticleFAQ: Phishing Tactics and How Attackers Get Away With it
Phishing attacks on enterprises can be calamitous in terms of compromised networks or damaged brand names, and the Anti-Phishing Working Group (APWG), which aggregates and analyzes phishing trends data...
View ArticleBooming Mobile Industry Spawning Global Criminal Marketplace
In an alarming 'post-PC' era alert, working group says criminal infrastructure created much faster than it was for PC fraud.
View ArticleSpear Phishing Paves Road for Advanced Persistent Threats
Specialized spam can be more than it seems -- it sets up a beachhead for malware mischief.
View ArticlePhishers Try to Fry Apple Fanboyz After Dev Site Breach
Internet con artists quickly jumped on the news of a data breach at Apple's developer website to launch a phishing campaign aimed at relieving users of their online credentials.
View ArticleResearchers Propose Security That Adapts to Combat Malware That Morphs
Attackers launch malware that automatically alters itself to avoid detection, and they constantly create new domains where their command-and-control servers can hide, but researchers have come up with...
View ArticleGroup Behind Attack on New York Times Linked to G20 Phishing Attack
Multiple groups are leveraging the upcoming G20 summit to launch Spear Phishing attacks, including the group responsible for attacking the New York Times.
View Article
More Pages to Explore .....