The security whodunnit: analyzing the language used in an attack is just one tool to assign attribution, and it’s not always reliable. Read More ▶ |
|
| White Paper: Sophos Inc Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads. Read More ▶ | Dear subscribers to Computerworld’s Security Issues and Trends newsletter. You are receiving this newsletter as the result of a merging of newsletter lists across CSO and Computerworld. We hope you'll find it valuable, but you can unsubscribe at any time by going to the newsletter signup page (http://www.csoonline.com/newsletters/signup.html). Read More ▶ |
| Amazon's discounted their devices for Father's day, but time is running out. If you're in panic mode and still need a gift, check out the discounted Echo, Echo Dot or Kindle. Pull the trigger today for free Prime 2-day shipping (hint: if you don't have Prime, get the free trial). Read More ▶ |
| Developers need to make sure they are baking security into the application code and protecting how their apps handle data, but as the so-called HospitalGown security issue shows, they also need to know how the back-end servers and data stores are being configured. Read More ▶ |
| | You can reduce potential damage by paying attention to when attackers are most likely to strike. Read More ▶ |
| On June 21, IDG Enterprise will follow the sun and discuss the challenges organizations across the globe face when attempting to identify or mitigate risk. To do this, IDG has organized Security Day, a global event that is coming to Tyson's Corner in McLean, VA. The U.S. segment will be hosted by CSO's own Bob Bragdon, and includes a stellar lineup of experts and insiders. Read More ▶ |
| White Paper: Sophos Inc With firewalls becoming increasingly complex, buying one can be a confusing experience. And even when you've identified requirements you need for your firewall, trudging through each vendor's website and datasheets is a time-consuming process. This guide has been designed to make finding the right firewall easy for you. It pulls together the critical capabilities and features that all firewalls should have. Read More ▶ | CSO Insider | Editor's Picks |
|
|
|