HomeCybersecurity

Cybersecurity

Which Windows Do You Need at Home?

Most people need all the help they can get when they buy a new PC. Give them bad advice and theyre very likely to...

Spyware Trail Leads to Kazaa, Big Advertisers

The StopBadware.org coalition, funded by Google, has listed the Kazaa file-sharing application at the top of a list of noxious software programs that present...

Trojan Redirector Ups the Ante in Online Banking Attacks

Researchers at Websense Security Labs have stumbled upon a password-stealing Trojan that uses sophisticated DNS redirection techniques to dodge server shutdowns and hijack online...

USAID Finds Safe Haven from Hackers

Uganda, Senegal, Uzbekistan, Moldova, Ecuador, Haiti—name any impoverished country in the world, and the U.S. Agency for International Development is probably there on the...

Pyrotek Finds Hot Security Fix

The sun may have set on the British Empire, but such is not the case for Pyrotek, a company that has grown at a...

Security Appliances Take Step Up

Enterprise users of Symantecs integrated threat protection systems can now extend that protection to remote and branch offices with the introduction of two midsize...

End-User Furlough

DesktopStandards PolicyMaker Application Security 2.5 provides outstanding tools to help companies solve the problem of application compatibility in restricted desktop environments. However, the Microsoft...

Pings & Packets from eWEEK Labs – 9

Convoq App Melds With SalesforceSellASAP for AppExchange does a good job of blending Convoqs Web conferencing features into the context of selling in Salesforce....

Creation Is Not Control

Id pay to listen to any conversation including Lawrence Lessig (a Stanford Law School professor and widely published scholar of copyright issues) and Greg...

McAfee Gaffe Causes Chaos

Anti-virus powerhouse McAfee was left wiping egg from its face after shipping a virus definition update that incorrectly flagged hundreds of legitimate software programs...