IBM predicts critical infrastructure attacks in 2011
Robert Westervelt, News Director
Big Blue anticipates organizations struggling to manage smartphone security and predicts that critical infrastructure will be among the top targets of cybercriminals in 2011.
Google Android Trojan surfaces in China
Security Bytes blog
The newly discovered Geinimi Trojan infects users of Android smartphones by embedding itself in mobile applications downloaded from third-party services.
Android enterprise security: Mobile phone data protection advice
Cybersecurity 2010: Looking back and lessons learned - Part 2
Security Squad podcast
The editorial team continues its discussion on some of the top IT security news stories of 2010 such as Microsoft's legal action against Waledac botnet, the McAfee DAT File issue and more.
Cybersecurity 2010: Looking back and lessons learned - Part 1
Stop Web Attacks
Follow these free how-to tips and improve your security capabilities:
Performing a security risk analysis to assess acceptable level of risk
Email, website and IP spoofing: How to prevent a spoofing attack
How to detect rogue DHCP servers, routers and NICs on a network
Fake antivirus pop-up scams: Forming a security awareness training plan
How to detect and prevent keylogger attack
Robert Westervelt, News Director
Big Blue anticipates organizations struggling to manage smartphone security and predicts that critical infrastructure will be among the top targets of cybercriminals in 2011.
Google Android Trojan surfaces in China
Security Bytes blog
The newly discovered Geinimi Trojan infects users of Android smartphones by embedding itself in mobile applications downloaded from third-party services.
Android enterprise security: Mobile phone data protection advice
Cybersecurity 2010: Looking back and lessons learned - Part 2
Security Squad podcast
The editorial team continues its discussion on some of the top IT security news stories of 2010 such as Microsoft's legal action against Waledac botnet, the McAfee DAT File issue and more.
Cybersecurity 2010: Looking back and lessons learned - Part 1
Stop Web Attacks
Follow these free how-to tips and improve your security capabilities:
Performing a security risk analysis to assess acceptable level of risk
Email, website and IP spoofing: How to prevent a spoofing attack
How to detect rogue DHCP servers, routers and NICs on a network
Fake antivirus pop-up scams: Forming a security awareness training plan
How to detect and prevent keylogger attack
No comments:
Post a Comment