OS X hardening tips
OS X security is evolving: defenses are improving with each OS release but the days of “Macs don’t get malware” are gone. Recent attacks against the Java Web …
Unwrapping holiday gift card fraud
Spending on gift cards is expected to hit new highs this holiday season – the National Retail Federation predicts that gift card sales will reach almost $30 billion. …
Beware of online dangers lurking this Cyber Monday
Cyber Monday is often regarded as the beginning of the holiday shopping season, but many vendors are rolling out deals early as to entice online users to visit their web sites …
Overcoming the data privacy obstacle to cloud based test and development
How many times have data security and privacy constraints brought your key application development initiatives to a screeching halt? It usually occurs right around the time …
Cyber Monday security tips for businesses
Security experts at Neohapsis have put together the following tips to help keep businesses safe. 1. Use HTTPS – Remind employees to use HTTPS to make sure all data …
Innovations that will shape network security
Headline after headline, some company reports a cyber incident and hangs its head in shame. While it is disappointing, strong businesses have strong leaders that show us how …
Best practices for businesses to secure their IT infrastructure
“Tis the season for reflecting on another year’s success, kicking off 2014 planning and preparing for… security attacks? With Cyber Monday and the holidays …
5 mobile app security tips
ICSA Labs released a list of 5 mobile app security tips to help enterprises protect their data. 1. Dynamic analysis is a must. If deploying security tested mobile applications …
Top 12 scams of the holiday season
McAfee released its annual “12 Scams of Christmas” list to educate the public on the most common scams that criminals use during the holiday season to take …
7 must-have technical security controls for any budget
Prioritizing items on a security budget can be difficult. Here’s seven key technical controls every IT shop should include in a security budget. 1. Perimeters defenses …
Free eBook: 9 Steps to Cybersecurity
9 Steps to Cybersecurity from expert Dejan Kosutic is a free e-book designed specifically to take you through cybersecurity basics. Aimed at people with limited prior …
Hypervisor-based, hardware-assisted system monitoring
In the last few years, many different techniques have been introduced to analyse malicious binary executables. Most of these techniques take advantage of Virtual Machine …