Wednesday, October 27, 2021

Lisa Phifer

Guard Your PC Against PDF Malware

Clicking on a PDF in your email in-box can be lead to series of security headaches. Lisa Phifer provides tips to protect yourself from PDF-based malware. In early...

RSA Security Wrap Up

The year's RSA security conference -- as always -- revealed the biggest trends in enterprise security. Lisa Phifer reports. At last week's RSA Conference, dozens of network hardware,...

10 Dangerous Web Malware Threats

Websites that spread malware may be leveling off, but Web-borne malware encounters are still growing. According to a 2Q10 Global Threat Report published by Cisco, criminals are...

Windows 7 Security: 10 Positives

After a devastating wrong turn with Vista, Microsoft is back on its game with Windows 7. Sure, Windows 7 has annoyances – such as touting attractive features,...

Ten Leading Wi-Fi Security Challenges

Gone are the early days of Wi-Fi, when CSOs lost sleep over threats like WEP cracking and war driving. 802.11n products have matured to the point where...

10 Worst Cybersecurity Snafus of 2009

From stolen devices and phishing attacks to buggy apps and human blunders, 2009 was another banner year for data breaches. According to the Privacy Rights Clearinghouse, over...

Wi-Fi: Best Supporting Actor at CES 2009

Wireless High Def TV. Internet audio/video content navigation and delivery. IP multi-media storage and streaming. Digital photo frames and netbooks. At CES 2009, Wi-Fi was...

Case Study: Leveraging Next-Gen Wi-Fi to Transform Healthcare

El Centro Regional Medical Center's Director of IS John Gaede intends to use innovative medical technologies to transform healthcare. "We can attack escalation in healthcare cost by...

Meru Debuts ‘Virtual Port’

Before Wi-Fi can displace Ethernet as the LAN access method of choice, enterprises must learn how to accurately plan, budget, provision, troubleshoot, and tune WLANs. To facilitate...

802.11: Better, Stronger, Faster–and Greener

After a full year of draft 802.11n deployment, we've reached the point where all major technical challenges have been resolved and enterprise WLANs run as well-oiled machines—right?   Of...

VoIP Security: SIP�Versatile but Vulnerable

As a mission critical service, VoIP deployments require careful assessment to identify and eliminate security vulnerabilities in VoIP clients, applications, and infrastructure. But what exactly...

Latest Articles