• September 13, 2010 13 Sep'10

    Creating a network endpoint security policy for hostile endpoints

    The plethora of IP-enabled devices available today makes it harder to discern a friendly endpoint from a hostile one. Learn how to create an endpoint security policy for non-corporate-owned devices.  Continue Reading

  • September 10, 2010 10 Sep'10

    bot worm

    A bot worm is a self-replicating malware program that resides in current memory, turns infected computers into zombies (or bots) and transmits itself to other computers. A bot worm may be created with the ultimate intention of creating a botnet that...  Continue Reading

  • September 09, 2010 09 Sep'10

    "Here you have" email worm spreads

    An old-style email worm was spreading Thursday, antivirus vendors reported. The malware, named "Here you have" for the message it carries in the subject line, includes a link that appears to be a ...  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close