| Similar Articles |
 |
InternetNews December 9, 2009 |
Symantec Brings Storage, Security to Amazon EC2 Security software vendor now offering endpoint security and storage foundation apps through Amazon's cloud.  |
InternetNews September 16, 2009 Larry Barrett |
Hackers Targeting Web 2.0 Sites at Alarming Rate Security software vendor Websense claims 95 percent of user-generated comments on blogs and message boards are either spam or contain malicious code.  |
InternetNews May 20, 2010 |
South America Emerges As Cybercrime Hotspot China gets all the bad press but it turns out that Luxembourg, the Cayman Islands and a bunch of South American countries are actually the least discriminating when it comes to filtering malware.  |
Bank Technology News September 2008 Rebecca Sausner |
Security Reaches For the Clouds Just about the only business-naming trend hotter these days than "as a service" is "in the cloud," and IT security offerings are no exception. The cloud has become a trendy buzzword; many company's re-branding all their hosted services and calling them cloud based."  |
InternetNews February 11, 2009 Richard Adhikari |
Spammers Hijack Facebook Group of 1.5 Million Facebook site is taken over by get-rich-quick and other familiar spam.  |
InternetNews December 31, 2010 |
Smartphone, Social Threats to Mark 2011 Security As enterprises increasingly embrace popular consumer technology, experts warn of coming threats to social networks and popular devices like the iPhone.  |
Entrepreneur June 2010 Ericka Chickowski |
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them.  |
InternetNews December 2, 2010 |
Targeted Malware, Spam Will Surge in '11 Security software vendor predicts more malware campaigns will use social media to target mobile devices, apps and industry-specific systems.  |
PC World August 12, 2002 Tom Mainelli |
Symantec Unveils Automated Norton AntiVirus Updated program zaps latest worms, seeks out instant messaging nasties, and doesn't bother you with the details.  |
InternetNews July 22, 2010 |
Shortened URLs Are Spam Magnets: Gartner Abbreviated URLs are standard operating procedure on Twitter and everyone loves Twitter. So it's no surprise hackers are embedding malware in shortened URLs to evade security apps.  |
InternetNews June 2, 2010 |
Facebook Users Fend Off 'Likejacking' Attacks Hackers looking to take over Web sessions via Facebook are hiding malware under click-inducing, socially engineered links.  |
InternetNews August 17, 2010 |
FaceTime Service Locks Down Social Nets The enterprise security firm unveils a new SaaS offering for helping enterprises manage employees' use of Facebook, Twitter and similar services.  |
PC Magazine February 1, 2006 Cade Metz |
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame.  |
InternetNews August 13, 2010 |
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages.  |
InternetNews January 24, 2011 |
Cloud, Virtualization Driving 2011 IT Spending While the recession still has IT budgets in deep freeze, CIOs in 2011 are turning their resources to new models of computing, including the cloud and virtualized environments.  |
Bank Technology News February 2006 Shane Kite |
Security: Aberdeen Doles Out Web-Safety Business Years of acquisitions created a network of systems that were making Internet security increasingly problematic. Aberdeen Asset Management's answer? Tap a managed security provider.  |
InternetNews July 21, 2009 Alex Goldman |
Erin Andrews Virus Infects Search, Blogs The taping of the original video was a Peeping Tom crime that criminals are now exploiting to infect PCs.  |
InternetNews August 6, 2009 |
Did Koobface Cause Twitter, Facebook Outages? A new variant of the widespread Internet worm Koobface made its debut today - just as Twitter and Facebook were hit by denial-of-service attacks.  |
InternetNews October 27, 2009 |
Cisco Buys ScanSafe for $183M in Security Play Cisco's acquisition spree continues with purchase of SaaS security vendor ScanSafe.  |
InternetNews October 19, 2009 |
McAfee Takes E-Mail Security to Cloud, Streets Security software vendor unveils new e-mail security strategy that gives customers lots of options.  |
InternetNews November 20, 2009 |
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too.  |
PC Magazine September 23, 2008 Matthew D. Sarrel |
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it.  |
The Motley Fool July 28, 2004 Alyce Lomax |
Software Strengthening Like a Virus With security threats rampant, it's no wonder McAfee grew its quarterly earnings.  |
PC Magazine June 21, 2006 Matthew D. Sarrel |
Safety in Layers A successful antivirus strategy is one that stacks security.  |
InternetNews June 22, 2009 Alex Goldman |
Security Software Revenues Grew 19% in 2008 Security software and appliances remains one of the few areas of IT where spending is staying even strong, even as businesses cut or delay many of their projects in other areas.  |
InternetNews March 3, 2009 Richard Adhikari |
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments.  |
InternetNews September 10, 2009 |
Symantec Norton 2010 Hinges on Reputation Symantec's latest offering takes a different approach to evaluating files and applications on the fly.  |
BusinessWeek February 19, 2007 Stephen H. Wildstrom |
Mischief-Proofing Your PC Vista comes with only some of the protection you'll need.  |
InternetNews October 20, 2009 |
Cloud, Social Computing Lead Gartner's Top 10 Tech research firm presents its list of top 10 technologies and trends for enterprises in 2010.  |
InternetNews February 23, 2009 Richard Adhikari |
Malware Authors Exploit Facebook App Is a bogus application making the rounds on Facebook just a failed marketing ploy? Or something more dangerous?  |
PC World June 2004 Liane Cassavoy |
Viruses Target IM Virus writers and scammers are now plying their trade via instant messaging. Here are the real threats, and tips on avoiding them, including software solutions.  |
PC World March 2006 Andrew Sullivan |
Programs in Peril Popular applications have more security flaws than Windows does.  |
Search Engine Watch May 19, 2010 Simon Heseltine |
Can Facebook Drive Great Traffic to Websites? Data from April suggests maybe sites don't need to be as beholden to the big three search engines as we may think.  |
InternetNews December 5, 2008 Richard Adhikari |
Latest Facebook Attack Stems from Previous One Businesses with Facebook links must watch out.  |
InternetNews January 13, 2009 Richard Adhikari |
AVG Buys Sana For ID Theft Protection Pure play antivirus vendors are making sure they don't become extinct.  |
The Motley Fool November 7, 2011 Tim Beyers |
Facebook Can't Go Public Now The slightest misstep could set both Facebook and cloud-computing peers such as Google and salesforce.com back years in their efforts to replace install-and-maintain software alternatives.  |
PC Magazine June 22, 2004 Robert P. Lipschutz |
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself.  |
InternetNews January 15, 2008 Andy Patrizio |
Webroot Offers Cloud-Based E-mail Scanning Service New service compliments Webroot's client-side software and provides filtering of e-mail for viruses, spyware, phishing and unwanted images.  |
PC Magazine November 4, 2003 |
The PC Innovations Just Don't Stop Contrary to conventional wisdom, PCs just keep getting better.  |
CFO January 30, 2004 Esther Shein |
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream.  |
Search Engine Watch June 19, 2010 Johnny Widerlund |
Social Media: The Privacy and Security Repercussions How risky is our online behavior? A closer look at social media's privacy and security vulnerabilities.  |
InternetNews December 17, 2008 |
Warning, Your Antivirus Software May be Leaky If you think you're protected because you have antivirus applications installed, think again.  |
InternetNews September 21, 2010 |
Twitter Hit With Mouseover Malware Attack Twitter hit with attack that sees hackers embed JavaScript within URLs in tweets that display a pop-up directing users to malicious or pornographic websites.  |
InternetNews March 16, 2004 Sharon Gaudin |
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year.  |
Information Today February 2001 Marshall Breeding |
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world...  |
T.H.E. Journal April 2005 Jackson Ratcliffe |
Dominican U. Secures Network to Protect Students and Faculty Dominican University of California takes steps to combat worms, viruses and spyware.  |
InternetNews November 4, 2009 |
McAfee Unveils Appliance for SMB Set E-mail and Web security appliance protects networks with minimal system administration requirements.  |
CRM September 2011 Brittany Farb |
Cloud Expected to Keep Rising SaaS revenue will surpass $21 billion by 2015  |
PC World March 2006 Tony Bradley |
The New Virus Fighters Today's antivirus programs have no trouble stopping familiar intruders, but how safe are you from the unknown? A test of ten contenders reveals a new Best Buy.  |
PC Magazine August 11, 2008 Matthew D. Sarrel |
The Rise of Blended Threats Technology has made the world smaller, and therefore more dangerous.  |