intrusion - News, Features, and Slideshows

Most popular

News about intrusion
Features about intrusion
  • Needed: Breach detection correction

    By Taylor Armerding | 28 May, 2014 02:38

    There is no shame in being breached by a cyber attack -- security experts are unanimous about that. Prevention, while a worthy part of a risk management strategy, will never be 100% successful, given the sophistication and overwhelming volume of attacks.

  • 11 sure signs you've been hacked

    By Roger A. Grimes | 04 November, 2013 15:13

    In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.

  • 'HoneyDocs' lays irresistible bait for hackers

    By Jeremy Kirk | 17 September, 2013 12:01

    Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.

  • Chinese Government's Link to Cyber Espionage Clearer Than Ever

    By Thor Olavsrud | 20 February, 2013 16:09

    It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.

  • Unseen, all-out cyber war on the US has begun

    By Bob Violino | 28 January, 2013 11:09

    Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Cloud Security for Enterprise

Encrypt data with easy-to-use key management for virtual, private, and public cloud environments with Trend Micro SecureCloud™.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.