There's no question that cloud-computing infrastructures will become a significant part the IT plans of large corporations, according to analysts. The question, at least right now, is how well those hybrid internal/external infrastructures will be managed.
Kevin Fogarty |
13 Aug |
Read more
While many companies are considering moving applications to the cloud, the security of the third-party services still leaves much to be desired, security experts warned attendees at last week's Black Hat Security Conference.
Robert Lemos |
07 Aug |
Read more
Antivirus software has been around-well, nearly as long as viruses. But thanks to the ever-growing variety of threats to the PC environment, this is a fast-changing market that is undergoing two major trends:
Mary Brandel |
06 Aug |
Read more
CSO Publisher Bob Bragdon is a self-proclaimed "gadget head." His collection, which spans from 1987, runs the gamut from primitive digital address book to the latest generations of today's Blackberry and iPhone.
Joan Goodchild |
29 Jul |
Read more
A year has passed since security researcher Dan Kaminsky disclosed a serious flaw in the DNS that makes it possible for hackers to launch cache poisoning attacks, where traffic is redirected from a legitimate Web site to a fake one without the Web site operator or end user knowing.
Carolyn Duffy Marsan |
27 Jul |
Read more
As Hurricane Ike bore down on Houston one Friday last September, the Continental Airlines' flight operations center, located on the 14th floor of a glass-sided downtown high rise, suddenly went dark. For the airline's pilots and flight crews, however, business proceeded as usual.
Robert L. Mitchell |
29 Jul |
Read more
Most people lie, whether they're covering up something sinister or just embarrassed over a mistake. Research conducted a few years ago at the University of Massachusetts found that 60 percent of participants lied at least once during an observed 10-minute conversation.
Joan Goodchild |
28 Jul |
Read more
All too frequently a peer will contact me in a panic about recovering deleted files from a suspect's hard drive--after my peer has trampled on the digital evidence like a rookie police officer at his first crime scene. Often valuable evidence is lost for good,or unusable in court; or worse, the suspect knows he is being investigated.
Brandon Gregg |
23 Jul |
Read more
Social engineering and mind games expert Brian Brushwood has not come by his knowledge in the traditional manner of school or business training. Brushwood is the host of the Internet video series Scam School, a show he describes as dedicated to social engineering in the bar and on the street.
Joan Goodchild |
23 Jul |
Read more
At companies in the North America, Europe and northern Asia, swine flu may be the last thing on the minds of those in charge of security, pandemic planning and disaster preparedness. After all, it's summer and flu season is still months away.
Bill Brenner |
23 Jul |
Read more
If you've ever played the silly, maddening game known as "Whac-A-Mole," you know what futility feels like. As you smack one mole with the mallet, up pops another one. Their speed and number escalates as you flail away, trying to keep up. At some point, you realize there's no hope of winning.
Maryfran Johnson |
23 Jul |
Read more
E-commerce fraud costs retailers approximately $4 billion each year, according to the most recent results of an annual survey conducted by Cybersource, a provider of electronic payment and risk management services. Sebbe Jones, manager of fraud and disputes at 2Checkout, is in the business of keeping e-commerce fraud at bay.
Joan Goodchild |
17 Jul |
Read more
My Google Alerts for cloud security have been going off with an increased vengeance.
Pete Soderling |
20 Jul |
Read more
The relaunch of the popular online game World of Warcraft in China, where it has already been offline for six weeks, still faces an indefinite delay as it awaits government approval for its content.
Owen Fletcher |
20 Jul |
Read more
China has started restoring some Internet access to a province where it was blocked after deadly ethnic riots two weeks ago, but the outage has already taken a toll on local businesses.
Owen Fletcher |
20 Jul |
Read more
McAfee's latest version of its managed security service includes new features that let companies scan their Web sites for vulnerabilities as well as check for compliance with payment-card industry standards for handling financial data.
Jeremy Kirk |
21 Jul |
Read more
For most of us, not knowing what the weather is going to do might at worst result in a soggy barbecue or a washed-out cricket or football match. For a farmer in the developing world it could result in the loss of an entire harvest which, at best, makes life that much harder or, at worst, brings on financial ruin or considerable human suffering. If enough farmers over a wide geographical area are affected, widespread famine becomes a very real possibility.
Ken Banks |
21 Jul |
Read more
They sometimes call national security the third rail of politics. Touch it and, politically, you're dead.
Robert McMillan |
18 Jul |
Read more
Microsoft has sued a Hong Kong seller of mobile ringtones, saying the company used phishing techniques to flood Microsoft Live Messenger users with spam messages.
Robert McMillan |
17 Jul |
Read more
<em>According to research recently conducted by security firm Webroot, approximately three in ten social network users have experienced some form of a security attack, such as a virus infection or a phishing scam, on a social network in the last year. As the popularity of these social networks explodes, and more organizations ease restrictions among employees (See: ), they become more attractive for criminals seeking access to private information that can be used for profit. CSO asked two social network security experts for some of the latest scams found on Facebook and Twitter, and how to recognize and avoid them (For more tips to stay safe see: Seven Deadly Sins of Social Networking).</em> <a href="http://www.csoonline.com/article/482963/Facebook_Twitter_LinkedIn_Security_Pros_Warm_to_Web_._Access"/>
Joan Goodchild |
14 Jul |
Read more