Security

Recent Articles

  • Scareware Tops Security Threats List

    "Some situations and some programs do nothing but scare people and use an exploit to get on a screen and present an alert to users," says Jimmy Kuo, principle architect at the Microsoft Malware Protection Center and principle researcher of the study. “It usually does nothing; it takes advantage of name squatting and lands you…

  • Websense Launches First Security Appliance

    Providing solution providers with an additional weapon in their security arsenal, Websense announced the release of its first appliance to deliver gateway security that includes Web filtering, traffic inspection and deep inspection of Web 2.0 content. The Websense V10000 signals a change in the Websense model, which had been a software-only security vendor. By providing…

  • Conficker Tools Available, Countdown Hype in Overdrive

    When the clock strikes midnight tonight, Conficker.C—the worm on everyone’s mind for the last week—will phone home for new instructions, kick into overdrive, steal every piece of data it can find and—if you believe the hype—destroy the Internet as we know it. Well, at least that’s what the hype machine would have you believe. Security…

  • Stopping Conficker: The Tools You`ll Need

    Thanks to the exaggerated dangers posed by the Conficker worm, many are wondering if they are safe from the predictions of gloom and doom expected to hit internet connected PCs on April 1. Luckily, it takes very little to be prepared for and stop Conficker from impacting your PC and ending the world as we…

  • FBI Report: Internet Fraud on the Rise in Recession

    Small businesses may need the services of a trusted adviser such as their IT solution provider in the midst of the current recession more than they ever have before, given the recession-spurred rise in Internet fraud recently reported by the FBI. Or at least they should be careful about what businesses they choose to buy…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.