January 2007

  • Network-based attacks

    The second tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Gui...

  • How to assess and mitigate information security threats

    Learn how to assess and mitigate information security threats, like rootkits, worms and Trojans in the tip series created in collaboration with Realtimepublishers and Dan Sullivan, author of The Sh...

  • Apple fixes Mac Wi-Fi flaw

    The Mac OS X Wi-Fi flaw Apple fixed Thursday was first disclosed as part of the Month of Kernel Bugs in November. Attackers could exploit it to crash the targeted system.

  • IBM tool makes online purchases anonymous

    A new tool makes online purchases anonymous by using artificial identity information. Experts say enterprises need to adopt the technology before it can become a viable option.

  • Malware: The ever-evolving threat

    The first tip in our series, "How to assess and mitigate information security threats, excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide...

  • Information theft and cryptographic attacks

    The third tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide...

  • Quiz: Defending mobile devices from viruses, spyware and malware

    Test your understanding of the content presented in Defending mobile devices from viruses and malware lesson of SearchSecurity.com's Messaging Security School.

  • Expanding antivirus to include the mobile enterprise

    If your organization has yet to add mobile devices to its antivirus management strategy, it may be overlooking a tempting attack vector. As Sandra Kay Miller explains, it's not only necessary that ...

  • Countdown: Top 5 mobile spyware misconceptions

    This 10-12 minute podcast will count down the top 5 things people may falsely believe or not know about mobile spyware.

  • Microsoft investigates new Word zero-day

    An unpatched memory-corruption flaw in Microsoft Word is the target of "limited" attacks in the wild, Microsoft confirmed Thursday.

  • TJX data breach info used to make fraudulent purchases

    Fraudulent purchases have been reported globally, according to a trade association that represents more than 200 banks in Massachusetts.

  • How is ISO 17799 different from SAS 70?

    In today's security world, it's hard to keep track of each and every management standard and auditing procedure. In this SearchSecurity.com Q&A, security management expert Shon Harris reveals the d...

  • Defending mobile devices from viruses, spyware and malware

    Learn how to protect against mobile devices viruses, spyware and malware in this Messaging Security School Lesson with guest instructor Sandra Kay Miller.

  • Apple fixes critical QuickTime flaw

    The QuickTime flaw was disclosed earlier this month at the start of The Month of Apple Bugs Project.

  • McAfee: Malware all about ID theft

    The use of keylogger technology is surging and there's been a 100-fold rise in phishing attacks, according to a new report from McAfee.

  • Veracode launches on-demand code analysis service

    New startup Veracode gives customers the ability to analyze the application binary, and not simply the source code.

  • Cisco fixes IOS flaws

    Attackers could exploit three Cisco IOS flaws to cause a denial of service or launch malicious code. The networking giant has released fixes.

  • Cisco fixes MARS flaw

    Also in this week's Bug Briefs: Microsoft re-releases a patch, the Month of Apple Bugs exposes more Mac OS X flaws and Oracle fixes 51 flaws in its quarterly CPU.

  • ID theft victim to TJX customers: Mind your data

    Customers should guard their own data, says one ID theft victim. Meanwhile, some in the banking industry say TJX may have stored more data than necessary.

  • Storm worm keeps spreading

    Update: A Trojan that first exploited concerns about a storm that battered Europe last week has broken into new variants with new techniques and a wider range of fake headlines.