Security
Explore Articles
-
Mobile Productivity: Can We Get There from Here?
Mobile computing is one of the most exciting and important trends we have experienced in a very long time. Eliminating…
-
Printer Security: McAfee, Xerox Partner on Data Protection Offerings
Concerned that employees are not taking IT security policies seriously, McAfee and Xerox are teaming up to protect sensitive data…
-
Mobile Malware Doubled in 2011 with Android OS the Biggest Target
Malware that specifically targeted mobile operating systems increased in 2011 as smartphones became more popular with enterprise users, as well…
-
Waledac Botnet Reappears as New Password Stealing Variant
The Waledac spam botnet has reawakened, and its new password-stealing capabilities make it a much more dangerous threat than the…
-
Nortel Breach Exposes Security Vulnerabilities of All Enterprises
The decade-long security breach at Nortel, where thousands of company documents were exposed, is just a one example of how…
-
Cyber-Spies Intercepted Sensitive Files, Emails From Nortel: Report
Chinese hackers allegedly breached telecommunications company Nortel in 2000 and these cyber-spies gained access to reams of sensitive technical documents,…
-
Cyber-Criminals Using Established Malicious Networks to Deliver Payloads
Cyber-criminals are increasingly relying on a web of malicious networks, or "malnets," to launch their attacks, according to security firm…
-
Multiple Cloud Formations Require New Security Approaches
Reliable user authentication in deployment of a cloud service is of utmost importance. Even though a cloud service to which…