The Microsoft security update for January 2014 dishes up a relatively small collection of patches, but it's a valuable set. The KB2916605 patches for Microsoft Word and Web Applications fix three vulnerabilities, all of which provide Remote Code...
The situation described here does not come from the ivory tower; instead it comes from the real world and shows how to rapidly and efficiently address a zero-day vulnerability. You are probably already overwhelmed with patching. Alternatively, you...
Cyber criminals are currently exploiting a new zero-day vulnerability that affects all versions of Microsoft's Internet Explorer.
Last week, the FBI issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors.
Will white-listing or blacklisting better protect your enterprise? We weigh in on the ongoing debate.
Java suffers the most malware infections of any programming language and recent zero-day exploits now warrant removing it from business applications.
Endpoint security can be compromised if employees have permission to make administrative changes on company devices. However, they may still be at risk.
The year just started, but already two major software vulnerabilities have made headlines. One concerns Java. The other is called Operation Red October.
A new type of malware distributes Blackhole exploit kits that compromise user endpoints through malicious advertising, or "malvertising."
Cyber criminals are now exploiting users' vanity with a targeted attack on Google Alert to spread malware and gain access to sensitive information.