Do smaller businesses think they're immune to security threats?
Do small to midsize businesses (SMB) think they're somehow immune to <a href="http://www.networkworld.com/topics/security.html">security</a> threats?
Do small to midsize businesses (SMB) think they're somehow immune to <a href="http://www.networkworld.com/topics/security.html">security</a> threats?
Apple's App Store can be stocked with malware-infected apps by exploiting a bug in iOS, a noted security researcher said Monday.
The big zero-day exploit on everyone's mind is Duqu, or "son of Stuxnet" - but researchers don't expect <a href="http://www.networkworld.com/subnets/microsoft/">Microsoft</a> to include a patch for it in next week's Patch Tuesday. Instead, a manual fix could be out as soon as this week.
If the Internet is the new Wild West, then hackers are the wanted outlaws of our time. And like the gun-slinging bad boys before them, all it takes is one wrong move to land them in jail.
Windows Intune, Microsoft's Web-based PC management and security platform, may not get the same level of attention as cloud services like Office 365 or Windows Azure, but Microsoft is betting big on Intune to be the cloud service that will facilitate IT's evolving job of remotely managing PCs.
Zero-day exploits are nerve-racking for IT professionals but are far less dangerous than unpatched older vulnerabilities for which fixes are available, Microsoft says.
Mobile phones will become an increasing menace to network security that could drop malware onto protected devices when they dock to sync or plug into USB ports to charge, security experts say in a Georgia Tech report.
SSL/TLS, the protocol that protects <a href="http://www.networkworld.com/topics/security.html">security</a> of e-commerce, has taken a beating lately, with news items ranging from the violation of certificate authorities to the discovery of an exploit that beats the protocol itself.
At a time when the cyberthreat level is at its peak, many federal agencies continue to struggle with IT security.
Banking transactions for owners of <a href="http://www.networkworld.com/news/2010/110910-google-android-useful-resources-smartphones.html">Android</a> phones just became more dangerous with a new iteration of the <a href="http://www.networkworld.com/news/2011/072611-spyeye-trojan-morphs-to-defeat.html">SpyEye</a> Trojan designed to intercept two-factor authentication codes sent via SMS -- the first known version for Android.
Young males in emerging markets are the most likely to fall victim to cybercrime, whose total cost per year is approaching the scale of illegal drug trafficking worldwide, according to a study by the Norton division of Symantec.
A sizeable spike in <a href="http://www.networkworld.com/news/2011/051811-microsoft-one-in-14-downloads.html">malicious email attachments</a> is just subsiding, but if history is any indicator, several smaller spikes are about to follow that use even more deceptive means than their predecessors.
Denizens of the malware underworld who sell access to <a href="http://www.networkworld.com/news/2011/080911-defcon-voip.html">compromised computers</a> do so at varying rates depending on where the machines are located, researchers told the Usenix <a href="http://www.networkworld.com/topics/security.html">Security</a> Symposium this week.
A new Android Trojan is capable of recording phone conversations, according to a CA security researcher.
Malwarebytes this fall expects to release an enterprise-grade anti-malware platform that it says doesn't compete directly with traditional antivirus software because it relies more on observing how the malware acts and less on seeking code signatures.