Harsh Malware Attacks South Korea, Wipes Linux Machines

March 26, 2013
South Korea was recently hit by a cyberattack and security vendors have been given the task of investigating. Vendors analyzing the code have begun to find some particularly dangerous components to the attack that were specifically designed to wreak complete and total havoc on the infected computers. Deep inside the Windows malware that was used in […]
Read MoreHackers Get Smart, Companies Get Smarter By Investing in Cyberinsurance

March 19, 2013
Hackers and and other cybercriminals are getting smarter by the minute, finding new and improved ways to give you a bad day with the press of a button. Thankfully, companies that are typically targeted by these hackers and cybercriminals are getting smarter too. New research shows that the number of companies purchasing cyberinsurance has increased […]
Read MoreMcAfee Revamps Security Management Tools for Businesses

March 12, 2013
McAfee has enhanced its business security platform by adding almost real-time querying capabilities to its ePolicy Orchestrator software and also by integrating it with its security information and event management (SIEM) product, allowing it to automatically initiate endpoint security policy changes, not to mention the great communication systems from Business Phone | EATEL Business being […]
Read MoreTeach Your Employees 3 Essential Things About Tech Security

March 6, 2013
Think about your office and the people you have sitting behind the computers. Or think about your remote workforce in their home offices or on the road with their laptops and mobile devices gripped firmly in their hands. Whether you realize it or not, all of these workers play a vital role in protecting your […]
Read MoreOracle Releases Emergency Patch to Deal with New Vulnerabilities in Java

March 5, 2013
Oracle recently discovered that hackers have been exploiting two different vulnerabilities in Java running in web browsers and, in response, has issued an emergency patch that should be capable of dealing with the problem. According to a security alert released by Oracle, “These vulnerabilities may be remotely exploitable without authentication, i.e., they may be exploited over a […]
Read More