Category Archive

Security

Websense Threat Report 2014: Biggest Cyberattack Threats Exposed

According to network giant Cisco, 100 percent of enterprises unknowingly host malware. But as a recent Websense Security Labs report revealed, threats…

Read Article

The Next Online Crime: DDoS Extortion

Imagine you work at a company that does all of its business on the phone. Now imagine you receive a letter that says, “Pay…

Read Article

Anatomy of a Broken Heart: The Heartbleed Bug, Explained

On or before March 21, Google Security researcher Neel Mehta discovered the Heartbleed bug, which affects any website using the Secure Sockets…

Read Article

As Bitcoin Grows, E-Commerce Retailers Consider Potential Benefits

The biggest advantage e-commerce has had over traditional brick-and-mortar stores has been the simplification of point-of-sales systems with solutions like PayPal and Google Checkout,…

Read Article

Cisco Arms Itself with New Weapons in War on Malware

According to Christopher Young of Cisco’s Security Business Group, companies are constantly under attack from malware. “We’ve got not only a proliferation of attack…

Read Article

Preventing Server Hacks: Four Easy-to-Implement Solutions

From Adobe to Target, high-profile companies were the victims of serious data breaches in 2013. In…

Read Article

Life After the Target Breach: Where Does Payment Card Data Go from Here?

The well-publicized data breaches that hit retailers Target, Michael’s and Neiman Marcus have raised lots of questions about the security of payment…

Read Article

Cisco's Annual Security Report: Key Trustworthy Takeaways

According to Cisco’s Annual Security Report, 2013 was a banner year for organized cybercrime. Many companies were infected with malware, yet completely unaware, and…

Read Article

Shape-Shifting Website Code: The Solution to Ever-Changing Threats?

While antivirus and tech-security companies search for ways to detect and deflect current threats, hackers are creating a host of new viruses, rootkits and…

Read Article

The Basics of Building a HIPAA-Compliant Website

Any business defined as a “covered entity” or a “business associate” by the Health Insurance Portability and Accountability Act (HIPAA) must…

Read Article