Topic: Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

Ask a question

Join Now or Sign In to ask a question.
dthomas
12 hours ago

What steps should be taken to make websites secure against default script attacks?

ttopp
1 day ago

I have home WiFi that includes open WiFi because my kid's friends are always coming over. This lets them get online to play games and...

Tags: open WiFi, security, wifi |
2 Answers |
henyfoxe
2 days ago

I'm having trouble getting my PC "trusted" since I installed Windows 8. When I go into Action Center and select "Trust this PC" it just...

Tags: security, Windows 8 |
1 Answer |
rcook12
6 days ago

I was going through my email this morning and was shocked to see a spam email. I just looked at my gmail, and there were 418 messages...

Tags: email, filter, spam |
6 Answers |
jluppino
1 week ago

Is there a way to see log-in history for your gmail account? I suspect that someone I know has, and I've already changed the password,...

jluppino
1 week ago

Is there a way to see log-in history for your gmail account? I suspect that someone I know has, and I've already changed the password,...

ernard
2 weeks ago

Like any other operating system that becomes popular, Android is a target of individuals that want to install malware on devices....

3 Answers |
ernard
2 weeks ago

Like any other operating system that becomes popular, Android is a target of individuals that want to install malware on devices....

3 Answers |
dblacharski
3 weeks ago
TRUSTED VOICE

Yes, it's true that everyone should know better, and should be backing up data to an off-site facility on a regular basis. But, in...

4 Answers |
kreiley
4 weeks ago

What do you to prevent SQL injection attacks beyond simply not allowing raw SQL to be passed to your database?

3 Answers |
Microsoft has released a temporary fix for a zero-day vulnerability in Internet Explorer 8, which was used by hackers in a prominent attack against the U.S. Department of Labor's website.
Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation.
Testing company Ixia launches high-volume DDoS tests against F5 firewalls.
The U.S. military's reliance on foreign-made products, including telecommunications equipment and semiconductors, is putting the nation's security at risk by exposing agencies to faulty parts and to the possibility that producing nations will stop selling vital items, according to a new report from the Alliance for American Manufacturing.
Two U.S. senators will push Congress or President Barack Obama's administration to pursue trade and immigration sanctions against China and other countries that allegedly support cyberattacks on U.S. government agencies and businesses, the lawmakers said Wednesday.
A 35-year-old Dutchman suspected of participating in a large DDoS attack on antispam organization Spamhaus was extradited from Spain to the Netherlands on Monday evening, the Dutch Public Prosecution Service said Wednesday.
Researchers propose foiling password thieves by salting password databases with red herrings called 'honeywords.'
Airport's IT transformation to cloud, BYOD support is saving money, boosting security.
McAfee shares some tips on creating hack-proof passwords.
The development team behind the popular Nginx open-source Web server software released security updates on Tuesday to address a highly critical vulnerability that could be exploited by remote attackers to execute arbitrary code on susceptible servers.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+