Security Experts:

long dotted


A botched signature update released by Panda Security caused headaches for many home and enterprise customers. The security firm released a tool to address the issue.
IPS definition package update for Norton and Symantec products caused 32-bit version of Internet Explorer to crash. A new update has been released to address the issue.
A new survey from analyst firm Enterprise Strategy Group found that businesses want to invest in endpoint security technologies in order to improve incident response and incident detection.
IBM has released a software update for the company's Endpoint Manager solution to address a vulnerability that can be leveraged by a remote, unauthenticated attacker to execute arbitrary code.
Google's Macintosh Operations Team announced last week the availability of the source code for "Santa," a tool designed for whitelisting and blacklisting binaries on Apple's Mac OS X operating systems.
An integration feature that allows Parallels Desktop users to access Windows folders from Mac OS X operating systems can exploited for a guest-to-host virtual machine (VM) escape.
Version of the 5.1 of Microsoft's Enhanced Mitigation Experience Toolkit (EMET) brings improved protection and addresses several application compatibility issues.
The latest version of Apple's Mac operating system, OS X 10.10 Yosemite, is plagued by a critical vulnerability that can be exploited to take over affected devices, a researcher has revealed.
Windows 10 will include new information and identity protection mechanisms designed to address modern security threats.
Outlier Security, a startup co-founded by former HBGary CEO Greg Hoglund emerged from stealth mode with a new approach on how enterprises can detect threats targeting their endpoints.

FEATURES, INSIGHTS // Desktop Security

rss icon

Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Shaun Donaldson's picture
Virtualized end-user systems and public cloud computing will play a role in nearly every business over the next decade, but applying the disposable philosophy universally in an enterprise environment is beyond risky, when you consider how attacks have changed.
Alan Wlasuk's picture
I made a mistake the other day, a horrible mistake. I let my kid use my computer. My once perfect computer now has a life of its own, a malware bot that nests firmly in a place that I can’t see.
Michael Goff's picture
About 50 percent of all software piracy violations found at corporations happen from businesses that are already clients of the software they are accused of stealing. So, what steps should both the software vendor and their customers take to ensure the relationship avoids speed bumps such as software piracy?
Alan Wlasuk's picture
While our attention is immediately drawn to the Internet when we think about the benign-turned-evil Matrix, a more interesting comparison can be made to the current Internet plague of botnets.
Robert Vamosi's picture
Laptop batteries use microcontrollers to tell the lithium battery when it's full and when it needs to be recharged. What's intriguing is that cybercriminals could install malware that would remain on the device no matter how many times you reinstalled the operating system.
Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Noa Bar-Yosef's picture
Are major data breach headlines helping consumers become more secure? Not necessarily. Many users still ignore security advisories, and our lackadaisical approach to security affects other consumers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Ram Mohan's picture
Are your passwords safe? Three simple ways to create memorable yet secure passwords