Similar Articles |
|
Bank Systems & Technology June 17, 2007 Nancy Feig |
Banks Aren't Securing USB Ports, Study Reports Despite all the attention on data security, small devices in banks may lead to big trouble. |
PC Magazine August 31, 2005 Larry Seltzer |
Big Threat from Little Devices Unlike network use, local device access isn't logged, making it easy for individuals to walk out the door with sensitive information. |
InternetNews November 9, 2010 |
USB Devices Pose New Security Threats Portable drives and storage devices are a leading source of malware, according to one security software developer. |
PC Magazine December 10, 2010 Natalie Shoemaker |
HP Portable External Hard Drive (1TB) Combining the fast transfer speeds of USB 3.0 with 1TB of storage space, the HP Portable External Hard Drive (1TB) is the one to have. |
PC Magazine May 17, 2006 Robert Lemos |
A Moving Target Today, cell-phone viruses are not a big deal. But if you think your phone will always be safe, think again. |
PC Magazine January 12, 2005 Sebastian Rupley |
The Virus Wars--In Your Palm Build a big user base and the malicious-code writers will come. That's the logic that analysts and security software companies alike are following as they warn that smartphones and other mobile devices will become significant targets for security threats in 2005. |
PC Magazine August 30, 2006 Robert Lemos |
Gone in a Flash Stop your employees from infecting your systems or pocketing your company's intellectual property. |
InternetNews July 7, 2009 Alex Goldman |
Symantec: USB Keys Threaten the Enterprise As criminals innovate to attack PCs, Symantec promised to continue to fight them. |
InternetNews December 2, 2010 |
Targeted Malware, Spam Will Surge in '11 Security software vendor predicts more malware campaigns will use social media to target mobile devices, apps and industry-specific systems. |
InternetNews April 7, 2006 Tim Scannell |
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens. |
PC Magazine March 16, 2004 Leon Erlanger |
Hacked in a Flash Tiny USB drives offer unparalleled convenience to all sorts of users--including data thieves. |
PC Magazine July 29, 2003 Jamie M. Bsales |
Add Bluetooth Easily The Actiontec USB Bluetooth Adapter will let you add wireless connectivity to any PC with a USB port. |
Inc. April 2005 Lora Kolodny |
Seeing the iPod as a Security Threat As the popularity, storage capacity, and connectivity of gadgets like the iPod increase, experts say, so will the use of such devices to perpetrate computer crimes at work. But small businesses may may a built-in advantage against such threats. |
PC World October 2004 Tom Spring |
Tiny Drives With Big Brains Having basically replaced floppy disks as the portable media of choice for small amounts of PC data, USB flash drives are pursuing more widespread adoption. |
InternetNews November 17, 2010 |
Stuxnet, Mobile Threats Top 3Q Malware Report Security software vendor McAfee's 3Q Threats Report takes note of some older malware scams from the past and some new and discouraging new ones. |
PC Magazine April 4, 2008 Joel Santo Domingo |
Streamline Your Ports Do you hate plugging and unplugging USB devices from your "portable" notebook? |
PC World February 2003 Andrew Brandt |
Privacy in a Very Small Package A USB drive can help you protect your data. |
PC World February 2005 Kirk Steers |
Get the Right Connection for All of Your Hardware Bluetooth on the Rise... FireWire versus USB 2.0... Ubiquitous Serial Bus... Make the Hardware Connection... Get a Better Grip... |
InternetNews October 18, 2006 Ed Sutherland |
Apple Blames Microsoft for iPod Virus Apple Computer is apologizing to owners of recent video iPods users who may find their devices infected by a Windows-based virus. |
T.H.E. Journal December 2002 Vincent Weafer |
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. |
InternetNews December 31, 2010 |
Smartphone, Social Threats to Mark 2011 Security As enterprises increasingly embrace popular consumer technology, experts warn of coming threats to social networks and popular devices like the iPhone. |
PC Magazine September 28, 2005 Dan Dinicolo |
Securing Bluetooth Devices As Bluetooth becomes more pervasive, it's likely to become the target of more security threats. |
Wall Street & Technology January 5, 2005 David Tan |
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. |
Home Toys August 2005 |
The Top-10 Benefits of USB Device Connectivity This white paper examines USB (Universal Serial Bus) device connectivity and explores the "Top-10" benefits of device interoperability. |
Wall Street & Technology August 22, 2007 Nancy Feig |
USB Flash Drives Represent Top Threat To Corporate Security A new study reveals that more than 43% of companies have no controls in place to manage removable media devices and 27.4% leave it to the manager's discretion. |
InternetNews March 16, 2004 Sharon Gaudin |
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year. |
PC Magazine July 13, 2004 Sebastian Rupley |
Wireless USB Get ready for point-and-shoot video streaming. |
Popular Mechanics March 2006 Joel Johnson |
Tech Clinic Expert Q & A How many USB devices can I hook up to my PC at one time?... What is he Sony rootkit and how do I get rid of it if it's on my computer?... How can I tell if someone is freeloading on my Wi-Fi network?... |
InternetNews September 30, 2010 |
'Here You Have' Worm Takes Toll In September The new version of an old malware trick was the single largest security threat to enterprise IT departments last month. |