Similar Articles |
|
CIO August 1, 2005 Grant Gross |
VoIP Security Debate Heats Up Voice over IP (VoIP) telephony and malicious software for mobile devices are among the most-hyped IT security threats, according to Gartner. |
InternetNews September 20, 2005 Roy Mark |
Malicious Code For Profit New trend finds shifts toward attacks seeking confidential information. |
Inc. March 2007 |
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. |
InternetNews April 16, 2009 David Needle |
Top VoIP Threats Detailed by Security Firm The growing use of Voice over IP telephony services in the enterprise make it an inviting target for the bad guys. |
InternetNews June 16, 2005 Tim Gray |
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. |
InternetNews December 2, 2010 |
Targeted Malware, Spam Will Surge in '11 Security software vendor predicts more malware campaigns will use social media to target mobile devices, apps and industry-specific systems. |
Bank Technology News December 2005 Glen Fest |
Voip Security Threats: Swimming With The Sleeping Sharks? Banks' enthusiasm for installing VoIP shows no signs of waning. Will hackers, spammers, phishers and other criminals soon notice and start to take advantage? |
InternetNews September 23, 2005 Tim Gray |
Symantec Lands Anti-Phish Firm Security software giant Symantec is expanding its line of products with the acquisition of behavior-based security and anti-phishing firm WholeSecurity. |
InternetNews July 18, 2005 Tim Gray |
Trend Micro Stops Spam at The Network Antivirus vendor Trend Micro began rolling out Network Reputation Services, a portfolio of network-based, anti-spam services designed to complement the company's existing anti-spam offerings. |
InternetNews September 25, 2006 Ed Sutherland |
Report: Home Users Blind To Hackers According to a new status report from security vendor Symantec, home users are the target of 86 percent of attacks. Financial services ranked second, the target of 84 percent of phishing attempts in the first half of 2006. |
InternetNews September 17, 2007 Andy Patrizio |
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. |
Inc. October 2005 John Fried |
How to Avoid Scammers, Spammer and the Rest of the Bad E-guys Before anything else, you need to know who the on-line scammers are and how to keep them out. |
InternetNews March 16, 2004 Sharon Gaudin |
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year. |
InternetNews June 14, 2005 Tim Gray |
Trend Micro Acquires Kelkea Antivirus vendor Trend Micro hopes to tackle more Internet security issues, such as spam, phishing, and pharming. |
InternetNews May 26, 2006 Tim Scannell |
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. |
CIO September 15, 2005 Susannah Patton |
Dial VoIP For Vulnerability Voice over Internet Protocol offers great savings in long-distance calls. But without extensive safeguards, VoIP can expose your phone system to the havoc affecting the rest of the Web. |
Entrepreneur August 2006 Amanda C. Kooser |
Fast Talk VoIP is wasting no time in going wireless. |
InternetNews May 28, 2004 Sean Michael Kerner |
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. |
InternetNews April 8, 2008 Andy Patrizio |
Malware Problem Shows no Sign of Slowing It's easier than ever to write a phishing virus that looks like a Facebook app thanks to virus writer's toolkits, Symantec finds. |
InternetNews April 13, 2004 Sharon Gaudin |
Browser-based Attacks 'Surging' Virulent viruses and worms aren't the only things to watch out for. Security analysts say browser-based attacks are escalating in frequency and damage. And now a new study backs up the warnings. |
PC World February 3, 2003 Paul Roberts |
The Net Is Dangerous, Research Says Attack rates decline, but worms and software flaws keep cyberspace hazardous, Symantec reports. |
InternetNews October 3, 2006 Roy Mark |
Cyber Criminals Turn to Home Users Phishing and spam are on a dramatic rise as home users become the prime targets of online criminals. Attacks are up 81 percent over the last six months and spam jumped 50 percent over the same period. |
Fast Company October 2005 Scott Kirsner |
Sweating In the Hot Zone Imagine what life would be like if your product were never finished, if your work were never done, if your market shifted 30 times a day. The computer-virus hunters at Symantec don't have to imagine. |
Entrepreneur July 2005 Amanda C. Kooser |
Pharm's Way Learn how to protect yourself from the latest internet attack, pharming, which can lead to hijacked accounts or identity theft. |
InternetNews January 27, 2005 Jim Wagner |
Postini: Spam Building Muscle Trends in e-mail security threats in 2004 point to more difficulties in 2005. |
InternetNews January 14, 2004 Sharon Gaudin |
Last Year's Security Problems May Balloon in 2004 If 2003 was the worst year in history for viruses and spam, hold onto your hat. This year, according to security experts, is setting up to see the malicious problems that appeared last year grow and fester into major security problems for 2004. |
InternetNews June 8, 2009 Alex Goldman |
Symantec Says Phishers Have New Tools Automated toolkits are making it easier to attack services such as Facebook, Twitter and financial services brands. |
Information Today June 2005 Phillip Britt |
No Phishing Allowed Today, the biggest threats for companies and consumers are the new crimes with funny-looking names: phishing, pharming, and spim. |
InternetNews October 27, 2010 |
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. |
T.H.E. Journal April 2004 |
Security Leaders Launch Initiative to Combat Emerging Threats An industrywide collaboration led by Cisco Systems Inc. is trying to limit damage from emerging security threats such as viruses and worms. |
PC Magazine June 21, 2006 Neil J. Rubenking |
Buying Guide: Security Suites Cherry-pick firewall, antivirus, and antispyware utilities from different vendors and you risk incompatibility. |
The Motley Fool October 21, 2004 Tom Taulli |
Our Money, Our Lost Identities There are many threats to our pocketbooks in the online world. Entrust's plan to put a stop to it can have a big impact for e-commerce. The company posted revenues of $21.3 million, which was a 6% increase from the same period a year ago. |
Inc. February 18, 2003 Anne Stuart |
Security Issues with VoIP Are voice-over Internet protocol phone systems vulnerable to hackers? Can calls be intercepted? Unfortunately, yes. Here's a list VoIP Web sites you can dial into for more information on VoIP and its related security issues. |
T.H.E. Journal February 2005 Patrick Hinojosa |
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. |
InternetNews May 31, 2006 David Miller |
Security Software Gains Many Facets New software releases offer bundled features you might not expect in a security solution. |
InternetNews April 14, 2010 |
Symantec Debuts New Enterprise Security Apps New security suites aim to better protect businesses' networks from evolving cyber threats. |
InternetNews January 16, 2006 Sean Michael Kerner |
Online Shopping Boosted By Security Confidence According to a new survey, security concerns did not inhibit consumers from making online purchases. |
Wall Street & Technology July 26, 2004 Kerry Massaro |
Fast Facts From Radicati Group Learn some statistics about instant messaging, e-mail and spam, and voice over internet protocol. |
T.H.E. Journal August 2004 Ozkan & Gunay |
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. |
InternetNews April 20, 2010 |
Targeted, DIY Malware Here to Stay: Symantec Symantec's latest threat report provides plenty of disconcerting news for IT managers charged with safeguarding critical enterprise data. |
PC World May 2003 Andrew Brandt |
What Your Antivirus Software Won't Tell You Some security apps ignore surveillance programs. |
InternetNews February 24, 2009 Richard Adhikari |
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. |
InternetNews September 14, 2006 Roy Mark |
U.S. Unprepared for Internet Attack Recovery Cyber security experts cite lack of leadership from government and cooperation from private sector. |
InternetNews December 6, 2004 Tim Gray |
Phishing Grows with Holiday Shopping Spike Attacks jumped 80 percent in November and now target the workplace. |
The Motley Fool July 12, 2006 Matt Koppenheffer |
Securing Your Portfolio Data security has been a major area of interest and investment over the past decade, but it's been a tough place to be an investor. Want to play the data-security market? Seek out the gorillas. |
PC Magazine August 3, 2004 |
Computer Security: Who Is Responsible? There are ways to protect your computer and your office, as well as ways of shielding your kids from online dangers. No solution is perfect, but you'll be more secure if you follow the basics. |
National Defense August 2012 Eric Beidel |
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. |
Insurance & Technology April 19, 2005 Anthony O'Donnell |
Closing the Gate Defense solutions are beginning to place more focus on rejecting spam before they enter an enterprise's network. |
InternetNews January 23, 2006 |
IronPort's Web Reputation Security Can a 'credit check' for your e-mail eliminate phishing and virus threats? |
InternetNews July 19, 2010 |
Zscaler Leverages the Cloud for Email Security The Zscaler cloud-based security suite now includes real-time filtering to block spam and phishing attacks. |