Loading...


Internet Security Directory
TechRepublic: IT Security 2011

-

TechRepublic - IT Security: Forged memory fools antimalware: A new development i...

Votes:6 Comments:0
Malware developers are deploying a new stealth technology. Michael Kassner interviews an expert who explains how some rootkits forge memory to outwit antimalware programs. By Michael Kassner May 2 READ MORE
http://www.techrepublic.com/blog/security/forged-memory-fools-antimalw...

TechRepublic - IT Security: Mobile malware: A clear and present danger

Votes:14 Comments:0
A group of Berkeley researchers take a long, hard look at mobile malware. What they found should interest you. By Michael Kassner October 17, 2011 William Francis - fellow TechRepublic writer/A READ MORE
http://www.techrepublic.com/blog/security/mobile-malware-a-clear-and-p...

TechRepublic - IT Security: Why isn't everyone hacked every day?

Votes:14 Comments:0
Trouble befalls only a fraction of all who ply the Internet. Why is that? Michael Kassner explores the answer with a security researcher. By Michael Kassner October 3, 2011 From my bully pulpit READ MORE
http://www.techrepublic.com/blog/security/why-isnt-everyone-hacked-eve...

TechRepublic - IT Security: Security or convenience: Does it have to be a choice...

Votes:14 Comments:0
There are stacks and stacks of research explaining why we prefer convenience over security. Does that mean we can't have both? By Michael Kassner June 20, 2011 I just finished writing about a f READ MORE
http://www.techrepublic.com/blog/security/security-or-convenience-does...

TechRepublic - IT Security: Fuzzy hashing helps researchers spot morphing malwar...

Votes:35 Comments:0
Anti-malware applications are dependent on malicious software remaining the same, code-wise. So the bad guys just keep changing it. Michael Kassner looks at a possible defense: fuzzy hashing. By Mi READ MORE
http://www.techrepublic.com/blog/security/fuzzy-hashing-helps-research...

TechRepublic - IT Security: Endpoint security: What makes it different from anti...

Votes:38 Comments:0
Big-time emphasis is being placed on endpoint security. Trouble is: Ask three people what it is and you get three different answers. Michael Kassner tried to get some consensus. By Michael Kassner READ MORE
http://www.techrepublic.com/blog/security/endpoint-security-what-makes...

TechRepublic - IT Security: Cybercrime: Why it's the new growth industry

Votes:36 Comments:0
Deb Shinder takes a closer look at cybercrime trends to explain why it is seeing double-digit growth and what is being done to counteract this expanding industry. By Deb Shinder February 28, 2011 READ MORE
http://www.techrepublic.com/blog/security/cybercrime-why-its-the-new-g...
2011 Tech Republic IT Security blogs
Internet Marketing in Tennessee , Internet Marketing in Pennsylvania
-
Search
Search
Search
Search
Login
Privacy Policy