No other way in as users get better at security.... Hackers are increasingly resorting to social engineering techniques to obtain confidential passwords as businesses become better at locking down …
Could you be the weakest link?
As security increases, it is becoming harder and harder for hackers to get in. Businesses are patching and locking down their computer networks, and this is driving hackers to resort to alternative …
The art of self-defense in network security
You know that feeling you get when you first step out of an elevator in a building you've never been in -- a little disoriented, not quite sure where you are or where you need to be? If someone were …
Continue Reading about The art of self-defense in network security
Kevin Mitnick, infamous for his hacking exploits, now runs Defensive Thinking, an internet security company
What's the idea behind Defensive Thinking.com? The name was to encourage defensive thinking when people are working with information or computer systems. The human element is the most vulnerable, and …
Virus Activity During the First Half of 2003
The first half of 2003 was generally quiet in terms of virus activity. However, this does not mean there was total calm, as in these first six months there were two virus epidemics, involving the …
Continue Reading about Virus Activity During the First Half of 2003
Who's really responsible for hacker attacks?
Good con artists are rarely spontaneous. They take time to observe their victims' behavior, then find subtle ways to exploit the predictable foibles of human nature. And, while the resulting scams may …
Continue Reading about Who's really responsible for hacker attacks?
Who's really responsible for hacker attacks
Good con artists are rarely spontaneous. They take time to observe their victims' behavior, then find subtle ways to exploit the predictable foibles of human nature. And, while the resulting scams may …
Continue Reading about Who's really responsible for hacker attacks
Spoofing ability gives Palyh worm some legs
The Palyh worm has rapidly spread across the Internet because of a clever trick that allows it to make itself appear to be coming from Microsoft support, experts said this morning. Messages containing …
Continue Reading about Spoofing ability gives Palyh worm some legs
Virus Attacks Subsided in April
Virus activity subsided to a recent low in April, despite fears of an online "cyberwar" triggered by the war in Iraq, according to antivirus vendor Trend Micro Inc. In a statement, the company said it …
How to outsmart the silver-tongued hacker
Hackers will try to trick your users into revealing their passwords. They call it "social engineering", we call it a security risk. Here's how to fight it. While security officers focus on firewalls …
Continue Reading about How to outsmart the silver-tongued hacker