-
IBM enters mobile device management market via BigFix integration
Beta version of IBM Endpoint Manager for Mobile Devices supports Apple iOS, Google Android, Symbian and Microsoft Windows Phone devices.31 Jan 2012
-
Cridex Trojan breaks CAPTCHA, targets Facebook, Twitter users
The banking Trojan variant Cridex can break CAPTCHA tests in just a few attempts, allowing it to create malicious email accounts used for spamming and propagating the virus.31 Jan 2012
-
Phoenix Exploit Kit responsible for mass WordPress compromises
Security firm M86 Security has discovered hundreds of WordPress websites compromised by Phoenix.30 Jan 2012
-
Email providers push DMARC email authentication to combat phishing
DMARC creates an authentication loop that could help people determine the legitimacy of an email.30 Jan 2012
-
Screencast: How to use WPScan to provide WordPress plug-in security
Mike McLaughlin displays the abilities of WPScan and the simplicity the tool offers in assessing the security of WordPress plug-ins and avoiding related security vulnerabilities.30 Jan 2012
-
Malicious Android applications may have infected millions, Symantec warns
More than a dozen malicious Android applications on the Android Market contain a hidden Trojan that can steal information, download more files and display advertisements on the device.27 Jan 2012
-
Fake Firefox update delivers malware, exploit kits
Malicious webpages masquerading as browser updates are being used by attackers as launch pads for Trojan viruses and exploit kits.27 Jan 2012
-
McAfee adds SMS filtering, smartphone threat intelligence to Android security app
Mobile application supports Android smartphones and tablets with virus scanning and protection from Web threats and SMS attacks.27 Jan 2012
-
Time to ban dangerous apps? Exploring third-party app security
Column: Third-party applications are notoriously hard to patch and often easy to exploit. Is it time to ban applications, or can they be secured with a new approach?27 Jan 2012
-
Time to ban dangerous apps? Exploring third-party app security
Column: Third-party applications are hard to patch and easy to exploit. Is it time to ban some apps, or to take a new approach?26 Jan 2012
-
Understanding data security breaches eclipses preventing them
Companies are spending more time investigating the source of data breaches and their impacts to reduce expenses, says a survey.26 Jan 2012
-
Symantec pulls pcAnywhere, man-in-the-middle attacks are possible
Source code theft from Symantec’s systems in 2006 places pcAnywhere software at risk of being attacked. Company says software is bundled with many of its products.25 Jan 2012
-
Can Android virtual patching thwart Android malware attacks?
Application security expert Mike Cobb weighs the pros and cons of Android virtual patching to thwart Android malware attacks.25 Jan 2012
-
Kelihos botnet operator named in Microsoft botnet lawsuit
Microsoft has named a Russian programmer as the one who wrote the malicious Kelihos code used to create a small botnet that peddled spam and child pornography.25 Jan 2012
-
Explaining how trusted SSL certificates and forged SSL certificates work
Web security relies on valid, trusted SSL certificates, but as Michael Cobb explains, forged SSL certificates undermine the model for trusted Web connections.25 Jan 2012
-
Best practices: Gaining executive support for the software security lifecycle
Recent BSIMM3 study results provide guidelines for why executive support for the software security lifecycle is so important. Michael Cobb explains.25 Jan 2012
-
BIOS management best practices: BIOS patches and BIOS updates
Amid growing concern over BIOS threats, expert Mike Cobb discusses how organizations should manage BIOS patches and BIOS updates.25 Jan 2012
-
Dangerous applications: Time to ban Internet Explorer, Adobe in the enterprise?
CSIS says five dangerous applications are to blame for 99% of malware. Is it time to ban Internet Explorer, Flash and the others in the enterprise?25 Jan 2012
-
New Epsilon CISO to expand security team, assess security practices
Newly appointed Epsilon CISO Chris Ray said he will take a step back and get a better understanding of the business before trying to address gaps.25 Jan 2012
-
Windows 7 network security: Keys to a Windows 7 upgrade project plan
Ensure Windows 7 network security during your enterprise desktop upgrade with two essential elements for your Windows 7 upgrade project plan.24 Jan 2012
Security Management Strategies for the CIO