• 7 questions about the Mac malware scare

    Posted May 23, 2011 - 6:11 am

    A few answers help clarify what the MacDefender scareware plague really means for Mac users and administrators
  • Fighting today's malware

    Posted August 5, 2010 - 11:17 am

    How bad is it? Worse than you think. Here's what the new breed of malware looks like -- and what you can do to stop it
  • Quick actions help financial firm avoid security disaster

    Posted September 16, 2009 - 1:39 pm

    While most of the IT world has been spared a devasting security attack like Blaster and Sasser for the last few years, the damage wrought by all manner of lesser-known computer viruses continues to inflict corporate pain.
  • 5 Security Flubs Users Make When Browsing the Web

    Posted April 27, 2009 - 9:38 am

    Whether they are downloading dangerous content or falling prey to phishing scams, the end user continues to be the toughest security risk to mitigate in most organizations. Here are some of the more common security missteps users take when browsing how to head them in the right direction.
  • 12 ways porn has changed the Web (for good and evil)

    Posted December 22, 2008 - 3:28 pm

    The adult entertainment industry has helped shape the Internet as we know it today, even if it has also been at the forefront of a number of less savory innovations. Let's take a look at a not-entirely-dirty dozen.
  • Social networking security: Protect yourself

    Posted December 22, 2008 - 10:58 am

    If you're wading in the social networking pool, revisiting some core security principles can protect you from spammers and other characters on Facebook who can ruin your computer or identity.
  • As phishing evolves, criminals switch to malware

    Posted December 18, 2008 - 5:41 pm

    As security researchers have gotten better at blocking many of the fraudulent e-mail messages that were being sent from botnets, phishing gangs have homed in on a new way to make a buck.
  • Anatomy of a Spam Virus

    Posted October 13, 2008 - 6:47 am

    A botnet created by a trojan virus is sometimes referred to as SpamThru. According to the Don’t Bounce Spam organization, spammers have become very sophisticated in the way they manage their botnets , and the SpamThru Trojan is the leading example. In at least one case the botnet consisted of over 73,000 computers.
  • Phishing Emails Exploit Browser Weaknesses

    Posted October 7, 2008 - 8:59 am

    Most web browsers are supposed to protect people by implementing security zones. These safe zones use different security settings of a web browser, which can vary based on the location of the web page being viewed. Phishing emails can lure users to a malicious code web site.
Join us:






Join today!

See more content
Ask a Question