PayPal and Facebook avoided Anonymous’ advances, but other firms weren’t so lucky.Read More
Network security logs and anonymous interviews obtained by Bloomberg suggest that Coca-Cola was the victim of several targeted cyberattacks that it chose not to disclose to regulators, investors or even employees.
By Vic Hargrave Computer worms are a form of malware that have the capability to rapidly infect many computers on a network by sending copies of themselves from one system to another over network connections. The Melissa worm in 1999, Sobig worms in 2003 and MyDoom worm in 2004 all propagated through email in the…Read More
Corporate and IT security teams must come together and share their skills with one another.
The plot of the latest James Bond film, “Skyfall,” is loosely based on the Stuxnet saga.
As university researchers recently demonstrated in a proof-of-concept attack, even once-forgotten cloud security issues can return to pose new risks as cybercriminals evolve their tactics.
Smartphones and tablets are a hot commodity these days, but sales may climb even higher in 2013 thanks to the bundling of personal cloud computing services.
Patching costs a ton, regardless of whether you measure the costs in terms of time, lost productivity, or hard costs. Even worse is the cost of bad patching (or god forbid) not patching at all. But all of this money that you spend or even risk more or less represents budget that you could be…Read More
The benefits of the cloud have been proven for businesses of all sizes – every small business owner can save time and money while increasing their employees’ productivity by leveraging cloud technologies. Cloud technologies are faster to deploy, require minimal technical know how to manage, and cost less than on-premise technologies. These benefits let the…Read More