To counter security threats, developers can reverse-engineer their products, or take a less expensive and more effective approach
Microsoft details five critical vulnerabilities, including flaw that could be automatically exploited by a malicious Web page or e-mail
Organizations can derive the benefits of endpoint-security standards without the standards
Know of a harmful vulnerability that hasn’t gone public? A new program wants to hear about it.
The latest Computer Crime and Security Survey shows cybercrime incidents and the cost of security breaches are decreasing, but Web site attacks and thefts of sensitive information are rising quickly.
Microsoft patches two buffer overflow vulnerabilities, Apple patches OS X 10.4
How can organizations better contain virus outbreaks and defend against destructive or mass-mailing worms?
Automated worms and malware-born invaders are still wreaking havoc in the enterprise, and financial losses from cyber-criminals are increasing.
Targeted Trojan Attacks Increase, Security Zaps Productivity, Spyware Distributor Settles
CSOs worry about infected or unknown PCs logging onto their networks, but only one-third of companies are doing something about it
Analyzing esoteric attacks highlights where security can succeed and how secure devices can fail in unforeseen ways.
Bluetooth Attack Compromises PINs, New Smart Phone Malware, Charting the E-mail Security Market
Will security flaws dent Mozilla's status as a trusted alternative to Internet Explorer?
Microsoft Updates XP WiFi Security, Worm Goes Right-Wing
CA Antivirus Vulnerabilities; AOL Patches New Netscape; Beware Phishing E-mails Bearing Keylogging Software; New Trojan Encrypts PCs
The differences between signature-based, access control, and intrusion prevention products
Despite dedicated software to defend the enterprise, the economics of spyware leads attackers to respond with more complex attacks or attacks aimed at just one company.
Prosecuting Spyware Makers, A New Endpoint Security Standard
Three years after Microsoft launched an initiative to improve its products’ security, we talk to information security veteran Gary Morse, president of Razorpoint Security Technologies, about the results.
List helps prioritize vulnerability patching