The view from the top of IT with TechWorld Editor Rohan Pearce
We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to install.
By David Strom | 20 May, 2013 14:30
Previously unknown Mac OS X spyware, signed with a valid Apple Developer ID, has turned up on the laptop of an activist from Angola at a human rights conference in Norway.
By Lucian Constantin | 17 May, 2013 12:04
McAfee, part of Intel, today announced a profound shift in how it distributes and prices its consumer security products by introducing LiveSafe, a service that combines anti-malware plus a score of other capabilities, such as anti-theft protection and a so-called "safety deposit box" in the cloud that can only be accessed by means of the user's face or voice biometric.
By Ellen Messmer | 14 May, 2013 06:12
Hackers are finding it pays to call ahead before sending malware-laden email.
By Jeremy Kirk | 14 May, 2013 02:44
Adobe has warned users of its ColdFusion application server platform of a critical vulnerability that could give unauthorized users access to sensitive files stored on their servers.
By Lucian Constantin | 09 May, 2013 14:50
Sure, you want users to comply with security edicts, but would you phish your own employees or share your company's hack history? At least some CIOs say yes.
By Stacy Collett | 25 March, 2013 10:17
Applying Big Data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held here this week.
By Jaikumar Vijayan | 28 February, 2013 11:10
Sure you want users to comply with security edicts, but would you phish your own employees or share your company's hack history? At least some CIOs say yes. Insider (registration required)
By Stacy Collett | 03 January, 2013 13:04
The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
By Ellen Messmer | 10 December, 2012 17:57
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
By Tony Bradley | 09 March, 2011 06:06
With many backup and recovery strategies not keeping up with rampant data growth and increasing migration to virtual environments, many in-house IT budgets are stretched to breaking point. This whitepaper outlines the best practice in delivering a backup strategy that is efficient, effective and affordable. Click to download!