Top IT Security Bloggers

Botnets Are Everywhere – See How They Spread in the Trend Micro Global Botnet Map

Cybercriminals today create and use botnets to perpetrate their criminal activities.  Whether it is to send out Blackhole Exploit Kit spam or to use as entry points into organizations, the one constant is that most bots (victim computers) communicate back and forth with command and control (C&C) servers.  Trend Micro’s Global Threat Intelligence, derived from [...]

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

Botnets Are Everywhere – See How They Spread in the Trend Micro Global Botnet Map

Read the full article
CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Solutions-GigaVUE-420

In partnership, Newgen provides innovative network monitoring and security solutions based upon Gigamon’s GigaVUE-420 systems.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.