Social Media Vs. Organized Crime
White House launches plan to leverage social networks and new intelligence and information sharing technologies to fight crime on a global scale.
4 Basic Security Steps For SMBs
Time and budget limitations make poor excuses for a lack of security. Here are four key considerations for resource-constrained IT administrators at smaller companies.
HP TouchPad, Smartphone Hacked
The WebOS mobile operating system platform is vulnerable to XSS, cross-site request forgery based upon a researcher's published proof-of-concept for an attack.
End-User Security: SMBs Prefer Invisibility
Social media and mutating malware have changed the threat landscape, prompting smaller companies to list education and security users don't notice as top needs, Symantec found during the Endpoint Protection 12 public beta.
LulzSec's Top 3 Hacking Tools Deconstructed
Analysis suggests LulzSec was most effective using a relatively unknown vulnerability to launch large-scale, botnet-driven attacks against everyone from Sony to the Senate.
|