Trends

Get expert insights into the latest developments in cybersecurity to stay ahead of emerging threats and evolving technologies. Our in-depth analysis covers everything from new attack vectors and vulnerabilities to cutting-edge security solutions and trends.

  • How Cybercriminals Make Their Millions

    Botnets have been getting a lot of headlines lately, whether from last month’s arrest of the man allegedly behind the Mega-D botnet, or angry supporters of the WikiLeaks organization who have voluntarily allowed their computers to become part of the Low Orbit Ion Cannon (LOIC) as part of Operation Payback. Most botnets are used as…


  • Pushing 802.1X Settings to iPhones, iPod Touches, and iPads

    If you’ve implemented WPA or WPA2 Enterprise encryption for your Wi-Fi network, you probably know too well that it isn’t easy to configure the 802.1X settingson clients of a corporate or campus network. Even setting up Windows computers can be a pain, not to mention Mac OS X or Linux machines. Configuring and supporting mobile…


  • Top 5 Security Threats in HTML5

    Somehow technology seems to evolve at a rapid pace, even when the standards bodies that help define it do not. Consider that most of today’s websites are built on HTML4, a standard that was introduced in 1997. In the thirteen years since, the way we use the Web has changed dramatically, even if the underlying…


  • Navigating Smartphone Liability: Corporate Liable v. Individual Liable

      It’s a familiar scene played out in waiting lines, airport gates, and restaurants every day. Someone scrolls through their handheld device, scans some text, shakes their head worriedly or angrily then rushes to make a call to the office or a business colleague. While the finer points of whether or not checking messages in…


  • IBM AppScan Takes Aim at Input Validation

    Cross-site scripting (XSS) and SQL injection flaws are among the most common and lethal types of security vulnerabilities. Both sets of flaws often stem from the same root cause, which is typically some form of an input validation issue. Ensuring that input validation is done correctly is no easy task, which is where the new…


  • How To Encrypt a Windows Drive with DiskCryptor

    Encrypting your documents protects them from prying eyes if your computer becomes lost or stolen. However, you shouldn’t stop at just encrypting your sensitive documents. A thief can recover passwords and other sensitive information stored by Windows. Even if you password-protect your Windows account, your system files can still be easily accessed, for example, from…


  • 10 Ways to Protect Yourself from Firesheep Attacks

    Learn how to surf websites vulnerable to Firesheep without getting fleeced. Years after BlackHat sidejacking demos, far too many websites remain vulnerable to this session cookie hijack attack. Frustrated by apathy and inaction, web developer Eric Butler and colleague Ian Gallagher decided to raise awareness with Firesheep – a Firefox plug-in that makes sidejacking as…


  • Simple Steps to Securing Email with S/MIME

    Email has long been described as the “killer app” that attracted masses to the Internet starting in the mid-90’s. By one estimate, as of May 2009 some 247 billion emails are sent per day. Despite its massive and widespread use, the vast majority of these emails are relatively insecure. A conventional email message is vulnerable…


  • 9 Best Defenses Against Social Engineering Attacks

      No matter how much expertise and money you put into your network security and preventing data theft — firewalls, security appliances, encryption, etc. — the human element remains vulnerable to hackers who apply social engineering techniques. Social-Engineer.org, a non-profit organization of security experts seeking to raise awareness of the data theft threat posed by…


  • Top Ten Ways to Avoid an Evil Twin Attack

    Wireless security concerns don’t seem to be slowing hotspot growth. In 3Q09, AT&T hotspots serviced over 25 million Wi-Fi sessions – 66 percent more than in 2Q09. Aircell now offers in-flight Wi-Fi service on over 4,000 flights per day. In my hometown (Philadelphia), Comcast just launched over 2000 new Xfinity hotspots. Yet, few public hotspots…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies