Security
Explore Articles
-
What the Verizon Data Breach Report Says About the State of Security
Verizon’s annual "Data Breach Investigations Report" includes some sobering findings that show just how pervasive social and political hacking has…
-
Cyber-Criminals Change Tactics as Network Security Improves
Cyber-criminals, increasingly stymied by better security around traditional threats like spam and exploit codes, are changing gears and focusing more…
-
Cisco Takes Video Surveillance Virtual on UCS
Cisco Systems is virtualizing its Video Surveillance software, integrating it into the networking vendor’s Unified Computing System to offer businesses…
-
Android Malware Grows With Android Popularity
Malware detection and anti-crimeware solutions specialist Total Defense, Inc. announced the findings of its 2011 Internet Security Threat Intelligence Report,…
-
Twitter the Latest Front on the War Against Malware
Symantec security researchers are seeing cyber-criminals increasingly using Twitter as a way of luring mobile device users to their malware.…
-
Hackers Strike at Symantec, New York Ironworks in Retaliation for Arrests
Hackers associated with the group Anonymous on March 9 continued its retaliation for the arrests earlier in the week of…
-
Malware as a Service, Zeus Trojan Variants Biggest Threats of 2012
Verisign researchers, looking at what happened in the world of security in 2011 to get a better feel for what…