Your Search returned 1803 results from our Editorial content

Sort By

SECURITY

Russia claims it foiled a cyber attack from a foreign spy...

The Russian government claims to have foiled a “large-scale” cyber attack from foreign intelligence services meant to destabilize the country’s financial system....

SECURITY

Researchers find a way bypass the iOS activation lock

Two researchers claim to have found a way to bypass the activation lock feature in iOS that's supposed to prevent anyone from using an iPhone or iPad marked as lost...

   

SECURITY

Remote management app exposes millions of Android users...

Poor implementation of encryption in a popular Android remote management application exposes millions of users to data theft and remote code execution attacks.

SECURITY

‘Distributed guessing’ attack lets hackers verify Visa card...

Add credit card fraud to the list of things that distributed processing can speed up.

   

SECURITY

Major cybercrime network Avalanche dismantled in global...

Law enforcement agencies have dismantled a major cybercriminal network responsible for malware-based attacks that have been harassing victims across the globe for...

SECURITY

Data-wiping malware strikes Saudi government agencies

Saudia Arabia’s government agencies were hit with a cyber attack that security researchers are blaming on a worm-like malware that can wipe computer systems, destroying...

   

SECURITY

Implantable medical devices can be hacked to harm patients...

It's possible to transmit life-threatening signals to implanted medical devices with no prior knowledge of how the devices work, researchers in Belgium and the U.K....

SECURITY

Scholars, infosec experts call for action on Russian hacking...

In the wake of reports about Russian involvement in fake news and hacks against political targets leading up to the recent presidential election, scholars and security...

   

SECURITY

How IoT companies can learn from the Mirai malware exploitation...

John Ferron, CEO at HEAT Software addresses why IoT Security must not be an afterthought

SECURITY

Report: Only 6% of businesses use DMARC email authentication,...

In a study of 1 million corporate domains, only 60,000 had made any attempt at DMARC email authentication, and of those, only a quarter actually had enforcement...

   
   
Previous 1 3 4 5 180 181

Your Search returned 484 results from our White Paper Library

Sort By
McAfee

Managed Services

Secure in 15 — Start with Daily Practices

Get the Secure in 15 toolkit starting with the “15 Minutes Month-at-a-Glance” calendar. McAfee will send you additional tools and tricks to stay protected...


McAfee

Managed Services

McAfee Total Protection for Secure Business

Secure your business across systems, email, web, and data—all with one affordable solution created for the midsize organization.


McAfee

Managed Services

A Buyer’s Guide to Data Protection

Implementing data protection products and processes can be daunting. Make the right decisions by exploring what is available and what makes sense for your...


McAfee

Managed Services

Hands-On or Hosted Security: The Choice Is Yours

Do you manage security on premises or with Security-as-a-Service? Learn about the benefits of each approach, and get an overview of your options in this...


McAfee

Security

McAfee Email and Web Security Appliance Trial

15% better malware detection rate and 20% better spam and phishing catch rate—simply more effective than other filters. If that sounds like something you...


Meru Networks

WLAN

Security: Multiple Lines of Defense

To understand the unique vulnerabilities of wireless networks, it is necessary to analyze threats from the enterprise perspective. Wireless security vulnerabilities...


Admit One Security

Security

Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Altor Networks

Virtualization

Alternatives for Securing Virtual Networks

Discover the next generation security solution for the virtual environment. Check out how Altor VF monitors and controls inter-VM traffic, enforcing security...


Symantec Corporation

Security

Data Loss Risks During Downsizing

Are departing employees walking away with your company’s sensitive and confidential data?  In today’s economic environment a significant number of professionals...


Previous 1 3 4 5 48 49

Blogs

jon-collins

Thinking Different

Today’s tech can’t beat my stupid email response

Jon Collins’ in-depth look at tech and society

phil-muncaster

China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond

mark-chillingworth

CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Crowdfunding: Viable alternative to VC funding or glorified marketing?