threat

McAfee threat catalog doubles in less than two years

McAfee threat catalog doubles in less than two years

Researchers at McAfee Avert Labs said this week that it took only two years to double the number of malicious threats registered in its vulnerability database.
Ericka Chickowski Jul 7 2006 7:54PM Security
Spam and spyware threat to Angolan - and other - World Cup fans

Spam and spyware threat to Angolan - and other - World Cup fans

Fans of the Angolan national football team are more likely to be targeted by spam and spyware than any other fan, according to new research.
René Millman Jun 14 2006 3:12PM Security
Two-thirds fail to guard against mobile threat

Two-thirds fail to guard against mobile threat

Two-thirds of IT professionals fail to include mobile devices in their security policies, according to a new study.
René Millman Jun 9 2006 10:29AM Security
IM-based malware threat grows

IM-based malware threat grows

Just as the number of end-users enlisting instant messaging (IM) programs to communicate has risen, so too has the number of distinct families of IM-based malware. More attackers are utilizing this propagation method and infections are increasingly sophisticated.
Jose Nazario Jun 5 2006 9:39PM Security
Study: Men a bigger insider threat to U.K. businesses than women

Study: Men a bigger insider threat to U.K. businesses than women

Businesses in the U.K. face a serious security threat from their own employees, according to new research.
René Millman Jun 2 2006 2:40PM Security
Netsky-P worm tops Sophos May threat list

Netsky-P worm tops Sophos May threat list

More than two years since first appearing, the Netsky-P worm remains the most widespread piece of malware spreading via email, Sophos has said.
Staff Writers Jun 2 2006 10:32AM Security
Voting machine flaw: threat or not?

Voting machine flaw: threat or not?

An election watchdog group issued a security alert on Thursday claiming Diebold touch-screen voting machines - widely deployed in a number of states to replace traditional paper ballots - are susceptible to hacker attacks that could "incurably compromise" the terminals.
Dan Kaplan May 12 2006 9:57PM Security
Review: Nortel Threat Protection System

Review: Nortel Threat Protection System

The Nortel Threat Protection System runs on a Sourcefire platform, something that surprised us. The product is a flexible system composed of multiple sensors and a management console.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Sentivist Real Time Threat Protection System

Review: Sentivist Real Time Threat Protection System

NFR is one of the pioneers in intrusion detection and prevention, and its pedigree shows in this product.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Trojan threat to bank tokens

Trojan threat to bank tokens

A new trojan circulating the internet could render security tokens used for home banking useless, experts warned.
René Millman Mar 27 2006 4:54PM Security
Experts: RFID threat overblown

Experts: RFID threat overblown

The threat of viruses in radio frequency identification chips has been vastly overstated in media reports, security experts said Thursday.
Frank Washkuch Mar 16 2006 10:07PM Security
Best Unified Threat

Best Unified Threat

Overall Category Winner and Winner for Best Integrated Security Software: Proventia Desktop from Internet Security Systems
Staff Writers Mar 13 2006 7:43PM Security
New IM, Valentine's Day threat disclosed

New IM, Valentine's Day threat disclosed

Instant messenger users have another thing to worry about, according to security firm Symantec.
Frank Washkuch Mar 10 2006 9:08PM Security
Profit driven hackers a growing threat

Profit driven hackers a growing threat

Quiet, targeted and profit-driven. These are the adjectives describing the current attacks ruling the IT threat landscape, according to Symantec’s latest Internet Security Threat Report, released today.
Dan Kaplan Mar 7 2006 9:33PM Security
The Common Vulnerability Scoring System: Get your threat priorities right

The Common Vulnerability Scoring System: Get your threat priorities right

Over the years, I’ve seen and used a diverse range of methods to evaluate and explain the risks associated with a particular security threat or vulnerability. Depending on the audience and the nature of the environment being evaluated, there has always been – and always will be – a frequent need to reclassify the severity of a finding. This is particularly relevant when making use of findings derived from automated security tools.
Gunter Ollmann Mar 6 2006 7:04PM Security
Worms turn to top malware threat list

Worms turn to top malware threat list

For the ninth month running, Sdbot.ftp has topped the list of the most prevalent global IT security threats, according to a newly published monitoring report.
William Eazel Mar 3 2006 9:33AM Security
Botnet threat growing at 'alarming rate'

Botnet threat growing at 'alarming rate'

The trend of hackers and cybercriminals using botnets to conduct large-scale denial-of-service attacks increased at an “alarming rate” during the second half of last year, new research has revealed.
William Eazel Mar 2 2006 9:45AM Security
Is new Google desktop a threat?

Is new Google desktop a threat?

The debate continues over the security of Google’s latest desktop version because of a controversial feature that allows users to run remote searches across multiple computers.
Dan Kaplan Feb 24 2006 9:00PM Security
The threat from anonymous networks

The threat from anonymous networks

Eliminating anonymous traffic on corporate networks is vital to securing infrastructure, according to experts.
Rene Millman Feb 23 2006 10:34AM Security
NCSA threat list warns of trouble ahead

NCSA threat list warns of trouble ahead

In 2006, chief security officers will have to battle ever more sophisticated viruses engineered to target applications such as instant messenging and text messaging, a new report produced jointly be the Department of Homeland Security and National Cyber Security Alliance (NCSA) has warned.
William Eazel Feb 20 2006 10:20AM Security

Log In

  |  Forgot your password?