Similar Articles |
|
T.H.E. Journal December 2002 Vincent Weafer |
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. |
T.H.E. Journal November 2001 Sharon Ruckman |
Computer Parasitology: 8 Proactive Steps for Protection Computer worms pose a great threat to school network systems. Over the next decade they will change the nature of anti-virus software and require paradigm shifts in network infrastructure. Here are eight proactive steps your institution can take for protection... |
Defense Update Issue 3, 2005 |
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. |
InternetNews June 16, 2005 Tim Gray |
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. |
InternetNews February 9, 2005 Tim Gray |
Check Point Releases Two Security Measures The security company updates Integrity and secures event management with Eventia Analyzer. |
Entrepreneur March 2006 Amanda C. Kooser |
Hacker's Paradise Vincent Weafer, senior director of Symantec security response, talks about what internet security threats are shaping up. |
InternetNews April 6, 2005 Sean Michael Kerner |
Report: IM Threats All The Rage The first-quarter report by the IMlogic Threat Center says attack increase will likely continue. |
PC World July 29, 2002 Sam Costello |
Symantec Unveils Blended Security Software New product mixes firewall, antivirus, and intrusion detection tools to better protect PCs from a new wave of threats. |
Wall Street & Technology January 5, 2005 David Tan |
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. |
T.H.E. Journal August 2005 Irene Sandler |
Road Warriors on Trojan Horses Ensuring end user compliance reduces the cost of network security. |
InternetNews November 2, 2005 Tim Gray |
P2P Attacks Up; IM Hits Down Akonix Systems said its research team tracked 22 new attacks on Peer-to-Peer networks in October, a 19 percent increase over September. |
Information Today May 5, 2015 |
Cisco Integrates Solutions for Threat Protection Cisco integrated its Cisco Application-Centric Infrastructure data center solution with its FirePOWER Next Generation Intrusion Prevention System to provide automated threat protection for combating emerging data center security threats. |
InternetNews May 28, 2004 Sean Michael Kerner |
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. |
InternetNews August 4, 2005 Tim Gray |
IM Threats Bombard Systems The increase in attacks on instant messaging systems has corporations on guard. |
InternetNews March 19, 2004 Ryan Naraine |
It is Time for Some 'Friendly' Worms Let's face it folks, the virus writers have the upper hand these days. Is it time for the industry to be bold and imaginative about fighting back? |
InternetNews August 17, 2005 Tim Gray |
Windows Worm Goes Global The Zotob.B virus and its variants are now using chat channels to allow hackers to control infected PCs. |
InternetNews June 4, 2004 Sean Michael Kerner |
McAfee VirusScan and More Latest release of enterprise product includes intrusion detection. |
InternetNews July 21, 2006 Erin Joyce |
Old UTM is Still New in Network Security Research firm IDC, in its security trends forecast for 2006, said chief security officers, as well as other executives whose job it is to evaluate risk, must account for the broadening scope of emerging threats. |
InternetNews July 28, 2010 |
Cisco Warns on Enterprise Security Threats In its latest quarterly Global Threat Report, networking giant Cisco outlines a broad-ranging list of threats to enterprise security culled from its various security products. |
PC World August 21, 2007 Ryan Naraine |
Die, Spyware, Die! Spyware remains a continuing hassle and a potentially serious intrusion on your privacy. We tested the top antispyware programs to see which ones do the best job. |
PC World August 12, 2002 Tom Mainelli |
Symantec Unveils Automated Norton AntiVirus Updated program zaps latest worms, seeks out instant messaging nasties, and doesn't bother you with the details. |
T.H.E. Journal August 2004 Kelly Martin |
Unmasking Spyware Today's Internet threats often arrive so quietly that they're undetectable, allowing he malicious code more time to identify and extract additional sensitive information, including passwords, decryption keys and keystrokes. |
T.H.E. Journal April 2005 Jackson Ratcliffe |
Dominican U. Secures Network to Protect Students and Faculty Dominican University of California takes steps to combat worms, viruses and spyware. |
PC Magazine December 9, 2003 Leon Erlanger |
Top Five Myths About Safe Surfing Don't let a false sense of security put you in danger. |
PC Magazine August 3, 2004 |
Computer Security: Who Is Responsible? There are ways to protect your computer and your office, as well as ways of shielding your kids from online dangers. No solution is perfect, but you'll be more secure if you follow the basics. |
T.H.E. Journal April 2004 Judith Rajala |
Computer Virus Protection Simply having virus protection software on your institution's computer system doesn't guarantee safety and security. Instead, protection and prevention is a team effort between the users and the anti-virus software. Includes a list of useful websites. |
CIO September 15, 2002 D.F. Tweney |
Who's on Your Network? Intrusion detection systems can work, but they require time and money |
T.H.E. Journal October 2008 Andy McDonough |
More Is More No one solution can defend K-12 computer networks against the proliferation of digital threats. A multilayered strategy that addresses cyber safety on many fronts is a district's best hope. |
PC Magazine November 2, 2005 Seltzer Rubenking |
The Zero-Day Attack StarForce's Personal Safe'n'Sec... Prevx Pro 2005... Panda's TruPrevent... PivX preEmpt... Tips for installing behavior blocking software... ZoneAlarm Internet Security Suite 6... McAfee Internet Security Suite 2006... BitDefender 9 Internet Security... Panda Platinum 2006 Internet Security... Norton Internet Security 2006... Trend Micro PC-cillin Internet Security 2006... |
InternetNews June 7, 2004 Jeremy Jarrell |
ArcSight Counters Threats Unseen Current Subscriber Identity Module (SIM) technology provides protection against existing threats, but how do you combat something that isn't there? |
National Defense August 2012 Eric Beidel |
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. |
Insurance & Technology September 14, 2004 Peggy Bresnick Kendler |
Framework for Security Insurers need effective security infrastructures to withstand online threats from hackers and cyber criminals, as well as lapses by unaware internal users. |
InternetNews March 16, 2004 Sharon Gaudin |
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year. |
InternetNews September 6, 2005 Jim Wagner |
IMlogic Tackles Zero-Day Chat Threats The Real Time Threat Protection System attempts to block fledgling worms and viruses before they become a problem for network administrators. |
Financial Planning May 1, 2010 Joel P. Bruckenstein |
Doing Battle Because security threats are constantly evolving, advisors must stay on top of the latest developments if they are to protect their firms and clients. |
BusinessWeek February 19, 2007 Stephen H. Wildstrom |
Mischief-Proofing Your PC Vista comes with only some of the protection you'll need. |
CIO May 1, 2002 Jim Jones |
The Internet Is a Zoo Sharing information is the key to keeping ahead of cyberattackers... |
InternetNews December 7, 2005 Roy Mark |
Consumers Whistling Past the Security Graveyard Less than 20 percent of American home computers are adequately protected against viruses, spyware, hackers and other security threats. Nevertheless, an overwhelming majority of users believe they are safe from an attack. |
InternetNews June 11, 2009 Alex Goldman |
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. |
InternetNews December 1, 2004 Sean Michael Kerner |
Anti-Spyware Tools All the Rage The market for anti-spyware tools will hit $305 million by 2008, according to new research from IDC. |
HBS Working Knowledge May 30, 2005 Deepak Malhotra |
Six Steps for Making Your Threat Credible Sometimes the best way to make your threat credible is to act in a way that would normally be considered irrational. Restricting your options, sinking money into a potentially useless enterprise, and surrendering authority are the types of behaviors that smart negotiators usually try to avoid. |
Chemistry World June 10, 2015 Emma Stoye |
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. |
Bank Systems & Technology August 24, 2006 Peggy Bresnick Kendler |
Identity Management Addressing the biggest threats to information security for banks. |
Insurance & Technology November 5, 2008 Prasad Balakrishnan |
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. |
PC Magazine June 22, 2004 Robert P. Lipschutz |
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. |
InternetNews August 9, 2005 Tim Gray |
Security Firm Warns of IM Worm Akonix says Chode-D is moving rapidly over public IM networks and could hijack users' computers. |
Inc. March 2007 |
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. |
PC Magazine August 17, 2005 Ryan Naraine |
The Lookout: Ducking Spyware More that 90% of Internet users in the United States have altered their online behavior significantly to counter the threat of spyware programs, according to a study. |
InternetNews July 7, 2009 Alex Goldman |
Symantec: USB Keys Threaten the Enterprise As criminals innovate to attack PCs, Symantec promised to continue to fight them. |
T.H.E. Journal August 2004 Ozkan & Gunay |
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. |