The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
Security professionals typically overlook the Windows command line, instead spending their time with more complex GUI-based forensics tools. In this t...
Mutating computer viruses have been around for some time, but one type of malware possesses the ability to constantly rewrite its own code to successf...
Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the secur...
There are a lot of dirty and destructive pieces of software out there, but a logic bomb may cause some of the most damage. Triggered by the smallest o...
Mergers and acquisitions are common headlines in today's information security world, and that's great news for malicious hackers and data thieves. Whe...
Web application server attacks are nothing new, but attackers are coming up with creative new ways to penetrate them. Information security expert Pete...
Microsoft has touted Windows Vista as its most secure operating system ever. But if that's the case, why has it already been the subject of several hi...
Employee profiling is one technique to combat malicious insiders, but organizations should tread carefully. As identity and access management expert J...
Steganography is a useful technique for securely storing sensitivedata, but the difficulty in detecting its usage can create anopportunity for digital...
Enterprise VoIP vendors may tout "plug-and-play" products that are ready to run right out of the box, but those vendors may not be taking security int...