threats

Managing outbound email security threats

Managing outbound email security threats

When the subject of email security is mentioned, the first thought that comes to mind is "spam" or more appropriately "anti-spam."
Carsten Dietrich, Aug 17 2007 11:17AM Security
Black Hat attendees pick mobile threats as the next hot security topic

Black Hat attendees pick mobile threats as the next hot security topic

Mobile threats were considered the next major security issue by IT professionals who attended the Black Hat conference in Las Vegas last week, according to a survey released today by Symantec.
Frank Washkuch Aug 6 2007 9:59AM Security
Visualise behaviour to stop insider threats

Visualise behaviour to stop insider threats

Doing business in a connected world requires employees, partners and customers to have access to an ever increasing range of information channels. Along with the benefits this access provides, the risk of insider security threats increases.
Gordon Eubanks, Jul 30 2007 9:59AM Security
Websense targets unknown threats

Websense targets unknown threats

Websense claims that a newly-developed addition to its security suite can protect customers from unknown threats.
Clement James May 24 2007 12:15PM Security
New threats top April malware charts

New threats top April malware charts

ESET, a security firm based in Bratislava, warned today that April showed "renewed vigour" in terms of malware threats.
Clement James May 15 2007 2:36PM Security
Sophisticated web threats flummox most two-factor solutions

Sophisticated web threats flummox most two-factor solutions

The financial industry has been hit hard by the increasing sophistication of web-based threats, including online phishing and identity theft attacks. According to Gartner, these attacks caused losses upwards of US$2.8 billion in 2006 and the numbers don't seem to be abating in 2007.
John Terrill, May 8 2007 11:07AM Security
Symantec smokes out threats with Hamlet

Symantec smokes out threats with Hamlet

Symantec has been giving details of its forthcoming enterprise security software codenamed Hamlet.
Iain Thomson May 7 2007 2:29PM Security
Mobile phone users oblivious to data threats

Mobile phone users oblivious to data threats

Most mobile phone users do not take data security seriously.
Matt Chapman Apr 27 2007 2:50PM Telco/ISP
Hacking tools top malware threats

Hacking tools top malware threats

Backdoors, key-loggers and droppers the main malware menaces.
Matt Chapman Apr 27 2007 11:46AM Security
IDC: Portable threats set to rocket

IDC: Portable threats set to rocket

Worldwide mobile security license and maintenance revenue is expected to exceed US$200 million today, according to a new forecast from research firm IDC.
Fiona Raisbeck Apr 10 2007 10:21AM Security
How to protect against Wiki, MySpace and other Web 2.0 threats

How to protect against Wiki, MySpace and other Web 2.0 threats

Time Magazine recently bestowed its prestigious "Person of the Year" honour on "You," recognising the growing social importance of community and collaboration on the web.
Dan Nadir, Mar 28 2007 5:05PM Security
Mobile security: Tips and tricks to protect business from threats

Mobile security: Tips and tricks to protect business from threats

Anyone that’s ever had the less-than-pleasant experience of being cooped up in a cab with a taxi driver intent on educating you about the state of the world will surely tell you that when it comes to useful insights and analysis, cab drivers are not the best place to turn.
Simon Sharwood Mar 12 2007 11:41AM Security
How to protect your business from VoIP threats

How to protect your business from VoIP threats

As the epidemic of spam and malware continues to barrage email systems, one might think the industry would have learned to build strong security into new communications protocols. Unfortunately, in the case of VoIP - the most important new communications protocol since SMTP - this is not true. Historically, the development of VoIP infrastructure has prioritised quality and reliability over security, with few security measures being built in.
Neel Mehta, Feb 19 2007 9:57AM Security
Internet programming threats here to stay

Internet programming threats here to stay

Abundance of custom code turn online apps into attractive target.
Tom Sanders Feb 8 2007 9:50AM Security
Experts: Web-based threats to rocket this year

Experts: Web-based threats to rocket this year

Web based attacks are set to soar this year as hackers stop using emails to infect company networks, experts at Sophos have warned.
Fiona Raisbeck Jan 9 2007 4:09PM Security
Security threats fail to deter Mac faithful in 2006

Security threats fail to deter Mac faithful in 2006

Vulnerabilities aplenty this year, but little fear among the OS X community.
Shaun Nichols Dec 22 2006 9:49AM Security
Hot or not: Holiday threats

Hot or not: Holiday threats

The holiday season is officially underway. Retailers are bustling around to display choice merchandise, while consumers are busy spending. With businesses focused on meeting their end-of-year sales goals and planning for 2007, security may not be a top priority, which can be a costly mistake.
Jennifer Mack, Dec 6 2006 8:49PM Security
SMS-ishing & V-ishing amongst future threats

SMS-ishing & V-ishing amongst future threats

Terms like sms-ishing or v-ishing may be a part of common security vernacular, according to McAfee Avert Labs director of operations, Joe Telafici.

Negar Salek Dec 6 2006 11:37AM Security
Sms-ishing & V-ishing amongst future threats

Sms-ishing & V-ishing amongst future threats

Terms like sms-ishing or v-ishing may be a part of common security vernacular, according to McAfee Avert Labs director of operations, Joe Telafici.

Negar Salek Dec 6 2006 9:00AM Security
Hot or not: Network embedded device security threats

Hot or not: Network embedded device security threats

Hot: Expect attackers to increasingly target networked, multifunction devices, such as high-end printers, scanners and fax machines, as these devices continue to grow more sophisticated and move away from proprietary operating systems and software.
Amol Sarwate, Dec 5 2006 9:00AM Security

Log In

  |  Forgot your password?