Application security: It's something that no network can live without, especially in the age of Web 2.0.
But what is application security exactly and what is its role in the enterprise? While most users have a very concrete understanding of most sta...
Score another point for Microsoft. The Redmond, Wash.-based software powerhouse announced late Sunday night that it had taken down several of the most damaging botnets connected to the powerful Zeus banking Trojan.
In what it described as its “most...
While slower than other weeks, March 19-23 was defined by a few major threats and some eye-opening reports. Here is a look at this week's security front.
WordPress Domains Compromised: An untold number of WordPress domains have been compromised in a...
These days, BYOD has moved out of the realm of trend and moved into the realm of phenomenon.
And almost nowhere is this phenomenon--or rather, the growing pains associated with the birth of this phenomenon-- more keenly felt than in the healthcare s...
Perhaps one of the most fascinating aspects of the criminal underground how it follows tried-and-true business protocols. And, as budding entrepreneurs, you got to hand it to the criminal masterminds for their ingenuity and business acumen when it co...
Last week, malicious exploits and politically motivated attacks seemed to dominate the threat landscape. Here are a few of the week's biggest security happenings.
** MS RDP Exploit In The Wild**: Last week, researchers confirmed an active attack exp...
Apple's latest greatest toy, iPad 3, shipped today. But before you brave the lines at your nearest Apple or other mobile store, here are a few safety tips to remember.
Stay On The Alert For Suspicious Activity: On mobile devices such as the iPad, m...
In this month’s Security Minute, Fortinet’s Derek Manky talks about the resurgence of the Kelihos Botnet, hacker cash payouts at CanSecWest, the Ke$ha Twitter hack and the increase in Tax Day scams.
It could have been a script from a B movie. Top military officials from the North Atlantic Treaty Organization fell victim to a cyber attack because they simply accepted a fake friend request on Facebook.
In a tried and true attack, cyber criminals...
To say the least, Apple has had a lot on its plate lately. The company and extended gadget community is still abuzz with news of the recently unveiled iPad 3, Apple TV and even an updated iTunes, announced last week. But alongside its newly revealed...
Fresh on the heels of RSA, the security world is still rife with high-profile hacks, international crackdowns and mega security updates. Here is a look at last week's highlights.
Google Chrome Compromised, Patched: It might be a record, but Google w...
With a seemingly unstoppable upsurge of targeted attacks in recent years, hackers are naturally finding better ways to acquire personal identifying information to really hone in on their victims. They're called second stage attacks.
Specifically, se...
No stranger to privacy issues, the search giant Google seems to have taken an even bigger page out of Facebook’s manual lately. And privacy advocates are revving their engines.
Google's newly rewritten privacy policy, enacted Thursday, essentially a...
Malware, like anything else, runs in cycles. And as of late, trends seem to be pointing to extortion as the latest developing theme.
The ransom theme was given center stage April of last year after an attacker targeted Hyundai Capital's network in S...