Latest entries
5 followers 0 articles/week
25,000 co-opted Linux servers spread spam, drop malware and steal credentials

A new report details how 25,000 servers were compromised. The attacks would have failed if more than single-factor login (username/password) had been required.

Wed Mar 4, 2015 16:20
User education drops down ASD strategies to prevent security intrusions

An increase in intrusions using techniques that an educated user would not detect has led Australia's signals intelligence unit to place user education as the 28th most effective strategy for mitigating a cyber-intrusion.

Wed Mar 4, 2015 16:20
How mid-to-large companies can optimize security budgets

These tips will help medium-to-large businesses learn to make the most of their IT security budgets.

Wed Mar 4, 2015 16:20
SMB penny stretching 101: Making the most of your security budget

SMBs can learn how to deal with limited IT security budgets and scarce resources by prioritizing security controls and needs.

Wed Mar 4, 2015 16:20
Droidpak: A sneak attack on Android devices via PC malware

New Android banking malware leverages vulnerable PCs to install itself on Android mobile devices. Learn how to foil this latest exploit.

Wed Mar 4, 2015 16:20
Malicious intent can turn Chrome speech recognition into spying device

A speech recognition expert contends malicious players can turn Google's Chrome web browser into a remote listening device.

Wed Mar 4, 2015 16:20

Build your own newsfeed

Ready to give it a go?
Start a 14-day trial, no credit card required.

Create account