- Malware Can We Rely on the Antivirus' Ability to Disinfect a System?
When antivirus detects malware that already executed, clicking "Remove" and moving on is tempting but risky. Other undetected malware may remain, or attackers may have already expanded their...
- Malware How Antivirus Vendors Describe Their Cloud Capabilities
Cloud antivirus uses lightweight endpoint agents that send file details to provider infrastructure for analysis, allowing the broader user community to benefit from processed data. Major vendors...
- Malware Enterprises Won't Adopt Adobe Reader X Any Time Soon
Adobe Reader X's Protected Mode sandbox significantly improves security, yet 56% of enterprise installations ran vulnerable older versions. Organizations lack skills for large-scale non-Microsoft...
- Social Networking 11 Security Tips for Online Social Networking
Practical social networking security tips: ignore email links claiming to be from social sites, use HTTPS, periodically deauthorize unused apps, be skeptical of job postings, verify requests for...
- Social Networking The Use of Fake or Fraudulent LinkedIn Profiles
Fake LinkedIn profiles have been used in targeted attacks to establish contact with employees and in bank guarantee scams. Security researchers like Thomas Ryan demonstrated how easily fictitious...
- Social Networking Scams and Malicious Activities Using the LinkedIn Website
Scammers use linkedin.com as a URL redirector to malicious sites, post fraudulent job listings recruiting money mules, and send 419 scams through LinkedIn Inbox. LinkedIn's reputation lends...