Trends

Get expert insights into the latest developments in cybersecurity to stay ahead of emerging threats and evolving technologies. Our in-depth analysis covers everything from new attack vectors and vulnerabilities to cutting-edge security solutions and trends.

  • WordPress Gets Clickjacking Protection

    The open source WordPress blogging application is being updated to version 3.1.3 this week adding multiple security fixes and improvements. Among the fixes is a moderately critical patch for arbitrary file upload vulnerability “The application improperly validates uploaded files, which can be exploited to execute arbitrary PHP code by uploading a .phtml file with e.g.…


  • Using Wi-Fi Security on Mobile Phones and Devices

    If your smart phone, Android tablet, or iPad has become a part of your daily business or computing life, you should take its security just as serious as you do with your desktop or laptop computers since mobile devices are so much easier to misplace or become stolen. You could lose all your contacts, calendar…


  • How to Securely Manage Wi-Fi on Smart Phones and Tablets

    Unfortunately, there’s more to mobile security than the data you store. If your mobile device has Wi-Fi capability and you connect to unsecured Wi-Fi hotspots for Internet access without knowing it, there are more security concerns. Even worse, mobile devices don’t incorporate security features to directly combat Wi-Fi threats. The first thing to know is…


  • Top 10 Android Security Risks

    Last year, Android became the world’s second favorite mobile OS, racing past BlackBerry and Apple. 67 million of the nearly 300 million smartphones sold in 2010 were Android-powered devices like the Samsung Galaxy S, Motorola Droid X, and HTC EVO. New Android 3.0 (“Honeycomb”) tablets will spur even more growth this year. As a result,…


  • How to Protect an Entire Network with Untangle

    As you’re likely aware, guarding your PCs from malware – viruses, trojans, spyware – and hacking is crucial for protecting your files and data. However, don’t forget about your mobile devices. Malware and hacking will be becoming more prevalent on smartphones, pads, and tablets. This makes network-wide security protection even more beneficial. It can cover…


  • IronBee Open Source WAF Project Launches

    Web Application Firewall (WAF) technology is seen by manyas a much needed technology for Web application security. In the open source world, the ModSecurity project has helped to lead the charge for WAFs, but there is now a group that is aiming to build a new open source WAF called IronBee. Spearheaded by Qualys security…


  • What the Heck is DNSSEC?

    The Internet runs on DNS. More specifically, DNS (Domain Name System) is the protocol by which machine-friendly 32-bit IPv4 (ex: 74.125.226.145) and 126-bit IPv6 (ex: 2002:4A7D:E291:0:0:0:0:0) addresses are translated into human friendly representations like www.google.com. Paul Mockapetris wrote and implemented the earliest official version of DNS in 1983 and the original specifications were published as…


  • Top 10 Data Breaches of 2010

    No organization wants to make breach headlines; many have spent considerable sums to avoid them. And yet, huge data breaches are still being reported. The Identity Theft Resource Center catalogued 662 breaches in 2010, exposing more than 16 million records. Back in 2009, Heartland took first place by losing 130 million records to one SQL…


  • 11 Ways to Combat Botnets, the Invisible Threat

    The scary reality for organizations that house confidential and sensitive data, including the personal information of employees and citizens, is that there is no end to cybersecurity threats such as botnets, worms and hacking. Of these, botnets are perhaps the most frightening cybersecurity threat. These highly sophisticated, vulnerability-seeking threats manufactured by cyber criminals are nearly…


  • Communicating Complex Security Concepts

    Are you a visual learner or a verbal one? Consider the last time you had to change a password from a short, dictionary word like dogs to a longer, multi-character one like Eq_7A6>6fc8c. How were the instructions given and which ones helped you understand the parameters for acceptable passwords? Did verbal instructions like: The password…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies