Slide Shows

5 Ways To Avoid A Stolen Password Pitfall

Avoiding having your email or Facebook account hijacked or bank account drained takes a little work, but following these steps can greatly reduce the risk.
[May 02, 2013]

5 Phishing Attack Trends You May Have Missed

Phishing attackers change their tactics often, and a new report issued by the Anti-Phishing Working Group found the latest techniques have boosted the speed and efficiency of their campaigns.
[Apr 30, 2013]

Verizon Analysis: Top 10 Causes Behind Data Breaches

Attackers are stealing account credentials and bypassing security systems as valid users, according to Verizon's analysis of 621 breaches that occurred in 2012.
[Apr 24, 2013]

Top 10 Malware Threats To Microsoft PCs

Trojans, adware, viruses, worms and spyware are used by cybercriminals to steal account credentials and ultimately gain access to credit card data, intellectual property and other information. Here's a look at the top 10 threats.
[Apr 23, 2013]

5 Reasons DDoS Attacks Are Gaining Strength

The average attack bandwidth and duration has increased significantly in the first quarter of 2013, according to Prolexic Technologies, a maker of distributed denial of service (DDoS) protection appliances.
[Apr 17, 2013]

5 Lessons In How Not To Handle A Security Breach

These five data security breaches illustrate the need for an effective incident response plan and a skilled crisis communications team. And how a lack of those skill sets can make things worse.
[Apr 16, 2013]

5 Essential Steps To Effective Data Breach Notification

Having an incident response plan and ongoing training in the event of a breach is core to appropriately notifying those impacted by a data breach.
[Apr 10, 2013]

5 Security Requirements For Big Data Hadoop Implementations

Identifying and securing sensitive data in Apache Hadoop deployments is a challenge, according to security firm Dataguise.
[Apr 09, 2013]

5 Signs Enterprise Software Security Is Improving

Application security improvements and built-in antimalware defenses are forcing cybercriminals to find softer targets.
[Apr 03, 2013]

5 Factors Fueling Wave Of Java Attacks

Outdated Java plugins and easily available automated attack toolkits are a recipe for infected systems and stolen data.
[Apr 02, 2013]

2013 Partner Programs Guide: Security Vendors

When it comes to securing partner programs, these vendors went above and beyond with their antivirus, firewalls, intrusion detection and other security offerings.
[Mar 26, 2013]

6 Signs You've Been Sucked Into A Facebook Scam

Even the most careful of Facebook users can be tempted or tricked by app baits, spam and Likejacking. Here are six signs you may have been scammed.
[Mar 22, 2013]

Software Piracy Protections Need Rebooting, Study Finds

Software makers need to bake security, flexible licensing and other features into software to realize lost revenue, according to a new study.
[Mar 21, 2013]

Bombarded Browsers: More Flaws, But Quicker Fixes

More vulnerabilities in Chrome, Firefox, Internet Explorer, Opera and Safari were discovered in 2012 vs. 2011, according to data collected by vulnerability clearinghouse Secunia. How did the browser companies measure up against malware?
[Mar 19, 2013]

6 Steps To Address BYOD: A Security Management Roadmap

Follow these steps to better protect corporate data on employee-owned smartphones and tablets, ensure employee productivity and avoid a costly data security breach.
[Mar 18, 2013]

5 Costly Hacker Attacks Plaguing Enterprises

Security firm Solutionary, which analyzed data from more than 2,000 customers, found many common security weaknesses and threats force firms to open their wallets. Here are five of them.
[Mar 14, 2013]

5 Dangerous Web Application Flaws Coveted By Attackers

Whether it is a targeted or a widespread financially motivated attack, cybercriminals typically find a way into an organization by targeting underlying vulnerabilities and configuration issues. Here are a handful of dangerous Web application flaws that can be used to gain access into your business.
[Mar 08, 2013]

Getting Weird At RSA 2013: 10 Scenes That Made People Look Twice

Let's face it: Security vendors are getting weird when it comes to marketing their wares, and this year at RSA was no exception. CRN walked the show floor and found 10 scenes that were truly strange.
[Mar 05, 2013]

Apple Vs. Android: Which Smartphone Platform Is Safer?

Five top security researchers reveal their picks for the smartphone platform they believe is the most secure.
[Mar 04, 2013]

5 Most Dangerous New Hacking Techniques

From scrubbing memory of data to leaving a phony trail in malware code, some attackers are upping the ante when it comes to hacking into systems and stealing corporate data or controlling processes, say security experts who outlined the threat trends at the 2013 RSA Conference.
[Mar 04, 2013]


View archives for:  

                         
Top Stories




CHANNEL SERVICES >>