Security: Vulnerabilities


Complex Attacks Bypassing Enterprise Safeguards

Enterprises are increasingly being targeted by complex attacks designed to bypass existing safeguards.

Debunking 6 Myths about SSL VPN Security

Think VPN makes for secure data access and transfer? Think again.

Social Media: A Hacker's Secret Weapon for Accessing Your Network

Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.

Microsoft Report Dishes on Malware Prophylaxis, Zero Day Hysteria

Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.

Security: IT Shops Unprepared to Police Social Media in the Enterprise

Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.

New Windows Worm Exploits IT Sloppiness

Silly or not, the Morto worm has caused a good bit of mischief.

Q&A: The Increasing Complexity of Network Attacks

Attacks are getting increasingly complicated -- not just in the technology they use but in the number of parties involved in a single attack.

Dire Warning from McAfee Security Specialist

A new report from security specialist McAfee warns that the information security sky is nigh on falling.

Spearphishing on the Rise

Attackers are reducing traditional mass-spam phishing campaigns in favor of targeted or spearphishing attacks.

New Malware Attacks Both PCs and Macs

Malware-makers have a powerful new tool: a spam bot that infects both PC and Mac platforms -- with support for Linux and iPad operating systems in the works.

Analysis: RSA SecurID Token Vulnerabilities Back in the Spotlight

The other shoe finally dropped in the case of the SecurID data breach at RSA. Could the fallout have been avoided?

Security Vulnerabilities Down but Still Strong

Although the frequency of security vulnerabilities continues to decline, vendors were still preoccupied with patching last year.

Overcoming Security Pains in UNIX Environments

Getting a handle on UNIX vulnerabilities is no easy task.

Firewalls Get Failing Marks; Enterprise Security Flunking, Too

Why does IT pass the buck to other internal groups when it comes to safeguarding enterprise security?

How Mobile Computing, Not Windows Desktop, Will Transform Cybercrime

As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.

Microsoft's March Security Update is Light

Contains only three fixes.

How Continuous Monitoring Can Help Financial Services Firms Avoid Cyber Attacks

Follow these steps to achieve comprehensive visibility. They aren’t easy but they are necessary.

The Emerging Crimeware Market

The availability and sophistication of crimeware kits has contributed to the rapid evolution -- as well as the increasing sophistication -- of cybercrime itself.

Q&A: Real-World Security Decisions

How do you secure an environment in which risky behavior is business as usual?

New Year, New Threats: The Emerging Security Risks of Social Networking

Completely blocking access to social networking sites or online communities is not necessarily the only -- or the best way -- to stop these threats before they affect your business. The answer may lie in educating your workforce.