Malware and Vulnerabilities - News, Features, and Slideshows
A growing tendency by business units and workgroups to sign up for cloud services without asking their IT organization creates serious risks for enterprises.
A week after Microsoft pulled a Patch Tuesday update that crippled some Windows 7 PCs, the company has yet to provide a working fix for either the original flaw or the resulting problem.
Although Microsoft has pulled a patch from Windows Update that crippled some computers, it is still pushing a truncated version of the security update that contained the flawed fix.
Microsoft is quietly recommending that customers uninstall one of last week's security updates after users reported that it crippled their computers with the infamous "Blue Screen of Death."
A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company's stores in June and July.
Two months after Microsoft ended support for Windows XP, the catastrophic wave of exploits security experts expected to wash over the aged operating system have failed to materialize.
Microsoft has pulled out the big guns - a fear-of-God approach - to scare users into dumping Windows XP, telling them the most popular tasks done on a PC will put them in the crosshairs of cyber criminals.
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.
As bitcoin values jumped in the last months of 2013, malware designed to steal the virtual currency exploded, security researchers from Dell SecureWorks said this week.
Target's acknowledgement Friday that personal data of 70 million people, not 40 million as previously thought, may have been exposed to hackers in a recent data breach raises new questions about the incident and how it could affect victims.
Whitepapers about Malware and Vulnerabilities
Organisations are seeking greater control over their outbound security. They’re looking to find solutions that offer the greatest protection and control to prevent data loss, ensure compliance and increase productivity. Where should they start? •Every year brings an even more extreme set of threats to the enterprise than the last •The push for increased confidentiality and the use of SSL everywhere has made it more difficult for enterprises to monitor Internet usage •While there are solutions that can help mitigate some of these risks, it’s critical for enterprises to adopt a comprehensive and streamlined way to maintain visibility and control
- Exclusive Group secures new investment to support continued growth strategy
- Avaya awards its top Asia-Pacific channel partners
- A/NZ Shoppers deserting retailers due to online performance issues: Rackspace
- Fujitsu World Tour 2015: A focus on the healthy human side of IoT (+8 photos)
- Avaya finalises Ensa acquisition
- Microsoft throws open the doors for Cloud Foundry on Azure
- Don't blame free Windows 10 for PC business ills
- Google and Levi's team up on smart clothes
- Google bets that smart fabrics, gesture interfaces will replace fiddling on a tiny wearable touchscreen
- New NSA phone dragnet proposals blasted as flawed
- Aon CMO: Employee, executive cultural shift needed for content marketing success
- Shazam launches visual recognition content offering for brands
- Vivid Sydney, Kathmandu and Crown take up Instagram carousel ads
- IBM creates industry-specific predictive analytics as Salesforce unveils big data Wave
- Why GoDaddy needs a CMO and a chief customer officer