Slide Shows
|
|
5 Ways To Avoid A Stolen Password Pitfall Avoiding having your email or Facebook account hijacked or bank account drained takes a little work, but following these steps can greatly reduce the risk.
|
|
|
5 Phishing Attack Trends You May Have Missed Phishing attackers change their tactics often, and a new report issued by the Anti-Phishing Working Group found the latest techniques have boosted the speed and efficiency of their campaigns.
|
|
|
Verizon Analysis: Top 10 Causes Behind Data Breaches Attackers are stealing account credentials and bypassing security systems as valid users, according to Verizon's analysis of 621 breaches that occurred in 2012.
|
|
|
Top 10 Malware Threats To Microsoft PCs Trojans, adware, viruses, worms and spyware are used by cybercriminals to steal account credentials and ultimately gain access to credit card data, intellectual property and other information. Here's a look at the top 10 threats.
|
|
|
5 Reasons DDoS Attacks Are Gaining Strength The average attack bandwidth and duration has increased significantly in the first quarter of 2013, according to Prolexic Technologies, a maker of distributed denial of service (DDoS) protection appliances.
|
|
|
5 Lessons In How Not To Handle A Security Breach These five data security breaches illustrate the need for an effective incident response plan and a skilled crisis communications team. And how a lack of those skill sets can make things worse.
|
|
|
5 Essential Steps To Effective Data Breach Notification Having an incident response plan and ongoing training in the event of a breach is core to appropriately notifying those impacted by a data breach.
|
|
|
5 Security Requirements For Big Data Hadoop Implementations Identifying and securing sensitive data in Apache Hadoop deployments is a challenge, according to security firm Dataguise.
|
|
|
5 Signs Enterprise Software Security Is Improving Application security improvements and built-in antimalware defenses are forcing cybercriminals to find softer targets.
|
|
|
5 Factors Fueling Wave Of Java Attacks Outdated Java plugins and easily available automated attack toolkits are a recipe for infected systems and stolen data.
|
|
|
2013 Partner Programs Guide: Security Vendors When it comes to securing partner programs, these vendors went above and beyond with their antivirus, firewalls, intrusion detection and other security offerings.
|
|
|
6 Signs You've Been Sucked Into A Facebook Scam Even the most careful of Facebook users can be tempted or tricked by app baits, spam and Likejacking. Here are six signs you may have been scammed.
|
|
|
Software Piracy Protections Need Rebooting, Study Finds Software makers need to bake security, flexible licensing and other features into software to realize lost revenue, according to a new study.
|
|
|
Bombarded Browsers: More Flaws, But Quicker Fixes More vulnerabilities in Chrome, Firefox, Internet Explorer, Opera and Safari were discovered in 2012 vs. 2011, according to data collected by vulnerability clearinghouse Secunia. How did the browser companies measure up against malware?
|
|
|
6 Steps To Address BYOD: A Security Management Roadmap Follow these steps to better protect corporate data on employee-owned smartphones and tablets, ensure employee productivity and avoid a costly data security breach.
|
|
|
5 Costly Hacker Attacks Plaguing Enterprises Security firm Solutionary, which analyzed data from more than 2,000 customers, found many common security weaknesses and threats force firms to open their wallets. Here are five of them.
|
|
|
5 Dangerous Web Application Flaws Coveted By Attackers Whether it is a targeted or a widespread financially motivated attack, cybercriminals typically find a way into an organization by targeting underlying vulnerabilities and configuration issues. Here are a handful of dangerous Web application flaws that can be used to gain access into your business.
|
|
|
Getting Weird At RSA 2013: 10 Scenes That Made People Look Twice Let's face it: Security vendors are getting weird when it comes to marketing their wares, and this year at RSA was no exception. CRN walked the show floor and found 10 scenes that were truly strange.
|
|
|
Apple Vs. Android: Which Smartphone Platform Is Safer? Five top security researchers reveal their picks for the smartphone platform they believe is the most secure.
|
|
|
5 Most Dangerous New Hacking Techniques From scrubbing memory of data to leaving a phony trail in malware code, some attackers are upping the ante when it comes to hacking into systems and stealing corporate data or controlling processes, say security experts who outlined the threat trends at the 2013 RSA Conference.
|
| • |
| • |
| • |
| • |
| • |
| • |
| • |
|
|


