Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Windows 10 will include new information and identity protection mechanisms designed to address modern security threats.
Outlier Security, a startup co-founded by former HBGary CEO Greg Hoglund emerged from stealth mode with a new approach on how enterprises can detect threats targeting their endpoints.
Two well known independent antivirus testing labs have published the results of tests performed on security products designed for devices running Mac OS X operating systems.
Symantec said it will replace its nine Norton products with one flagship solution: Norton Security, which will combine the functionality of existing products.
Microsoft has announced its intention to stop supporting older versions of the Internet Explorer Web browser starting with January 12, 2016.
Microsoft has decided to introduce a new feature that's designed to block ActiveX controls that are out of date, the company announced.
FireEye and Fox-IT have teamed up to provide a new service to assist users whose computers have been infected with the notorious CryptoLocker ransomware.
Pre-release notes published by Apple for OS X Mavericks 10.9.5 and Yosemite Developer Preview 5 are informing developers that they might have to re-sign their apps if they don't want Apple's Gatekeeper anti-malware feature to block them.
Microsoft announced the general availability of the Enhanced Mitigation Experience Toolkit (EMET) 5.0 on Thursday.
A security firm uncovered three zero-day vulnerabilities in Symantec Endpoint Protection that can be exploited for privilege escalation.

FEATURES, INSIGHTS // Desktop Security

rss icon

Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Shaun Donaldson's picture
Virtualized end-user systems and public cloud computing will play a role in nearly every business over the next decade, but applying the disposable philosophy universally in an enterprise environment is beyond risky, when you consider how attacks have changed.
Alan Wlasuk's picture
I made a mistake the other day, a horrible mistake. I let my kid use my computer. My once perfect computer now has a life of its own, a malware bot that nests firmly in a place that I can’t see.
Michael Goff's picture
About 50 percent of all software piracy violations found at corporations happen from businesses that are already clients of the software they are accused of stealing. So, what steps should both the software vendor and their customers take to ensure the relationship avoids speed bumps such as software piracy?
Alan Wlasuk's picture
While our attention is immediately drawn to the Internet when we think about the benign-turned-evil Matrix, a more interesting comparison can be made to the current Internet plague of botnets.
Robert Vamosi's picture
Laptop batteries use microcontrollers to tell the lithium battery when it's full and when it needs to be recharged. What's intriguing is that cybercriminals could install malware that would remain on the device no matter how many times you reinstalled the operating system.
Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Noa Bar-Yosef's picture
Are major data breach headlines helping consumers become more secure? Not necessarily. Many users still ignore security advisories, and our lackadaisical approach to security affects other consumers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Ram Mohan's picture
Are your passwords safe? Three simple ways to create memorable yet secure passwords