Cybercrime gangs, Mafia share similar DNA

The chain of command of a cybercrime gang is not unlike the Mafia, an evolution that shows how online crime is becoming a broad, well-organized endeavor.The latest research from Web security company Finjan

Share on LinkedIn Comment on this article Share with Google+ Published on: July 16th, 2008 Jeremy Kirk

Symantec offers small businesses “hassle free” security apps

Small business operators often carp about resource-guzzling security products that eat up precious computer memory, slow down their processes, and require extra time to maintain.But Symantec Corp. says it has the antidote –

Share on LinkedIn Comment on this article Share with Google+ Published on: July 16th, 2008 Nestor Arellano

‘Passphrases’- a better alternative to passwords

One of the members of the Master Mind Security Panel during the ITEC show in Charlotte, Dan Colby, made a great point. Basically, he said "quit using passwords." Colby is president and CEO

Share on LinkedIn Comment on this article Share with Google+ Published on: July 15th, 2008 James E. Gaskin

Savings windfall for firm that moved from Microsoft Outlook to Gmail

Taylor Woodrow, a UK-based construction company, has switched its 1,800 employees' e-mail from Microsoft Outlook to enterprise Gmail. The company is also beginning to use other components of Google Apps, the suite of

Share on LinkedIn Comment on this article Share with Google+ Published on: July 14th, 2008 C.G. Lynch

Chip maker goes to court to prevent smart cards flaws being made public

A semiconductor company is suing a Dutch university to keep its researchers from publishing information about security flaws in the RFID chips used in up to 2 billion smart cards. p>The cards are

Share on LinkedIn Comment on this article Share with Google+ Published on: July 14th, 2008 Sharon Gaudin

Should Apple iTunes be allowed on company computers?

Apple's iTunes is by far one of the most popular and widely-used consumer IT applications available today. It's likely more of your users have an iPod and employ iTunes than staffers that don't,

Share on LinkedIn Comment on this article Share with Google+ Published on: July 14th, 2008 Al Sacco and Ben Worthen

Cloud-computing and the seven deadly data risks

Cloud computing is fraught with security risks, according to analyst firm Gartner. Smart customers will ask tough questions, and consider getting a security assessment from a neutral third party before committing to a

Share on LinkedIn Comment on this article Share with Google+ Published on: July 7th, 2008 Jon Brodkin

Build a video surveillance system for as little as $250

Want to keep track of things at home or in the office when you're not there? Rather than spending thousands of dollars to have a professional video security system installed, you can build

Share on LinkedIn Comment on this article Share with Google+ Published on: July 7th, 2008 Brian Nadel

Trolls trash MySpace group profiles, wreak havoc

One of the first social networking upstarts, MySpace, is facing continuing security problems that threaten to spoil many of the innovative features that make the site useful.Hackers, spammers and Internet malcontents have turned

Share on LinkedIn Comment on this article Share with Google+ Published on: July 3rd, 2008 Jeremy Kirk

Notebooks as a service – a small biz offering with “big” potential

While software – or even hardware – as a service isn't a novel concept, a market may be emerging for what some call "notebooks as a service." One player in this space is

Share on LinkedIn Comment on this article Share with Google+ Published on: June 27th, 2008 Vawn Himmelsbach

Chinese, US sites biggest hosts of malicious code

More than half the sites spreading malicious code are hosted on Chinese networks, an anti-malware group said Wednesday.p>Of the over 213,000 malware-hosting sites analyzed last month by Stopbadware.org -- a joint effort of

Share on LinkedIn Comment on this article Share with Google+ Published on: June 26th, 2008 Gregg Keizer

One in three IT admins pry into out-of-bounds information

One in three IT administrators say that they or one of their colleagues have used top-level admin passwords to pry into confidential or sensitive information at their workplaces, according to a survey by

Share on LinkedIn Comment on this article Share with Google+ Published on: June 24th, 2008 Gregg Keizer

How to safely use Facebook and LinkedIn at work

The virtual flood gates have been opened and social networking is rushing in from the personal lives of employees and into the workplace – bringing a host of concerns along with it.Facebook is

Share on LinkedIn Comment on this article Share with Google+ Published on: June 23rd, 2008 Brian Jackson

There’s a cyber war looming and we’re doing little about it

"Rogue" states and criminal organizations have stepped up their capabilities to launch crippling online attacks, says technology strategist who has briefed U.S. members of Congress on threats of a "cyber war".That's the bad

Share on LinkedIn Comment on this article Share with Google+ Published on: June 18th, 2008 Nestor Arellano