The latest cybersecurity threats and news to help you protect your data, networks, applications, and devices.
The cornerstone of any reliable security system is authentication, the way of confirming the truth of something or the identity of a person. To protect data and/or control access to data, many organizations still rely on the simplest and most common form of authentication: the password. Not surprisingly, the basic password is too often breached…
Members of Anonymous claim to have taken down more than 50 child pornography Web sites and leaked the names of more than 1,500 members of one of the sites. “The Anonymous campaign began Oct. 14, when members of the hacktivist group found a cache of child-pornography websites while browsing a secret website called the Hidden…
Trend Micro is one of the “big four” business endpoint security vendors, along with Symantec, McAfee and Kaspersky. Its offering comes in two versions: a standard one, called OfficeScan Standalone, and a more comprehensive suite called Enterprise Security for Endpoints. OfficeScan Standalone offers protection for Windows-based endpoints and Windows, Linux and Netware servers, while Enterprise…