HomeCybersecurity

Cybersecurity

Is Two-Factor Authentication Being Oversold?

If youre exchanging sensitive data online and youre not worried about identity theft, you should be. Several new attacks are released every day to...

Alternative Browsers and Java Lead Spyware to IE

A malicious batch of adware and spyware has appeared that can use Firefox and other alternative browsers to infect Microsofts IE. According to a researcher...

Congress Aims to Create Broader Privacy Policies

The stream of high-profile data thefts this winter has turned a trickle of concern over information protection and privacy into a torrent of action...

IT Buyers Need New Purchasing Model

The IT industry has spawned more than its share of celebrity executives. Now IT has borrowed a celebrity from the world of entertainment, heiress...

Spyware Fracas Heats Up

There have been a few interesting stories percolating in the spyware/anti-spyware arena during the last few weeks. We had three anti-spyware vendors drop out...

Easier PCs Hinge on Better Security

One could argue that technology has come a long way. PCs are cheaper and faster than ever, with more memory and storage capacity than...

War Against Phishing Continues

Phishers and other online scammers are well ahead of law enforcement officials and security experts right now in terms of techniques and tactics, but...

Homeland Security Vacancies Strain Agenda

The power vacuum atop the Department of Homeland Securitys cyber-security division is straining the DHS relationship with key private-sector allies and hampering government efforts...

SSL-Explorer Offers VPN Basics

Companies looking for the most affordable way to kick off an SSL VPN technology pilot project—or deploy basic service for a small number of...

Check Point Secures VPN

With Connectra 2.0, Check Point Software Technologies Ltd. leverages its vast experience securing networks, applications and client endpoints to provide the most comprehensive security...