Features

  • Bad bots on the rise: A look at mobile, social, porn, and spam bots.

    By David Geer | 01 May, 2014 03:41

    From 2012 to 2013, Incapsula, a website security firm focusing on CDN solutions as load balancing, found that bot traffic went from consisting of 51 percent to 61.5 percent of all Internet traffic, a 10.5-percent increase. Thirty-one percent of those bots are malicious, according to data from the report.

  • 7 sneak attacks used by today's most devious hackers

    By Roger A. Grimes | 30 December, 2013 22:32

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • Malware: War without end

    By Lamont Wood | 26 November, 2013 15:17

    Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on.

  • 7 sneak attacks used by today's most devious hackers

    By Roger A. Grimes | 30 September, 2013 10:05

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • 8 essential features you need in a business router

    By Eric Geier | 17 May, 2013 15:56

    A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.

  • When in China, don't leave your laptop alone

    By Bob Violino | 04 December, 2012 11:11

    If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them

  • PC security: Your essential software toolbox

    By Eric Geier | 06 November, 2012 14:39

    Mobile malware is getting lots of attention these days, but you can’t forget about your PC’s security— after all, you probably still use it to pay bills, shop online, and store sensitive documents.

  • Mobile threats: the top 12 scams of Christmas list

    By Eric Mack | 10 November, 2011 05:02

    Malware targeting Android-powered mobile devices and Apple computers top a list scams and security threats the people need to guard against this holiday shopping season.

  • PDF files most trusted...and most targeted

    By Tony Bradley | 09 March, 2011 06:06

    PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.

  • Massive Mac OS X update shatters illusion of security

    By Tony Bradley | 12 November, 2010 02:15

    Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities that plague the dominant Microsoft Windows operating system? Well, don't believe the hype. Apple unleashed an update for Mac OS X this week which fixes a massive 134 vulnerabilities.

  • The low-down on low-level rootkits

    By Erik Larkin | 08 January, 2010 09:41

    Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.

  • Mobile malware will test Android and iPhone

    By Andreas M. Antonopoulos | 13 January, 2010 07:59

    2009 ushered in mobile malware with the first (and second) iPhone worm appearing just before Christmas.

  • Latest malware trick: outsourcing quality assurance

    By Tim Greene | 15 July, 2009 10:02

    Creators of Waledac malware enlisted the Conficker botnet as a tool to spread malware of their own, marking the first time Conficker was made available for hire, according to Cisco's mid-year security report.This was symptomatic of a wider trend Cisco noted of malware purveyors using established business practices to expand their illegal enterprises. Cisco likened the arrangement between Waledac and Conficker to a partner ecosystem, a term Cisco uses to describe its collaboration with other vendors.

  • How to beat 22 Web security threats

    By Andrew Brandt, Rosemary Hattersley, Robert McMillan and JR Raphael | 06 May, 2009 13:37

    Forewarned is forearmed. We investigate the latest and most deadly tech dangers, and explain how to fight back.

  • McColo takedown: Internet self policing or vigilantism

    By Jaikumar Vijayan | 02 December, 2008 09:01

    Few tears were shed when McColo, a US-based company that allegedly hosted systems for prolific purveyors of spam, malware and child pornography, was suddenly taken offline by its upstream service providers on November 11.

 

Latest News

03:26PM
Gigamon signs VARs to support Arrow distribution partnership
02:45PM
Revel forms tech alliance with Deputy
02:07PM
Avnet clinches Lenovo global distribution deal
01:46PM
Steve Wozniak to teach at UTS
More News
21 Oct
NewLease & Red Hat Breakfast Briefing (Melbourne)
21 Oct
DCIM Solutions Architect
22 Oct
NewLease & Microsoft Technical Sessions
23 Oct
NewLease & Red Hat Breakfast Briefing (Sydney)
View all events