- Malware How Antivirus Vendors Describe Their Cloud Capabilities
Cloud antivirus uses lightweight endpoint agents that send file details to provider infrastructure for analysis, allowing the broader user community to benefit from processed data. Major vendors...
- Malware Enterprises Won't Adopt Adobe Reader X Any Time Soon
Adobe Reader X's Protected Mode sandbox significantly improves security, yet 56% of enterprise installations ran vulnerable older versions. Organizations lack skills for large-scale non-Microsoft...
- Social Networking 11 Security Tips for Online Social Networking
Practical social networking security tips: ignore email links claiming to be from social sites, use HTTPS, periodically deauthorize unused apps, be skeptical of job postings, verify requests for...
- Social Networking The Use of Fake or Fraudulent LinkedIn Profiles
Fake LinkedIn profiles have been used in targeted attacks to establish contact with employees and in bank guarantee scams. Security researchers like Thomas Ryan demonstrated how easily fictitious...
- Social Networking Scams and Malicious Activities Using the LinkedIn Website
Scammers use linkedin.com as a URL redirector to malicious sites, post fraudulent job listings recruiting money mules, and send 419 scams through LinkedIn Inbox. LinkedIn's reputation lends...
- Social Networking The Potential for Malicious Ads on linkedin.com
LinkedIn's ad platform allows targeting users with ads linking to arbitrary URLs, yet no confirmed malvertising incidents have occurred. Possible reasons include the relatively high minimum cost per...