» malware

25% of malware spread by this overlooked threat

August 31, 2010 by Sam Narisi

It’s not just malicious websites and e-mail attachments anymore. These days, cybercriminals are using another method to spread malware: More…

Study: Antivirus programs can’t be trusted

August 16, 2010 by Sam Narisi

All businesses use antivirus software to keep malicious programs off the company network. But a study shows why those applications should just be one part of an over-all security strategy. More…

Smartphone malware can auto-dial pricey calls

August 6, 2010 by Sam Narisi

As smartphones become more common, so do viruses that infect them. Take this recent attack that gives criminals an easy way to steal from mobile users.  More…

Smartphone hack can inflate your monthly bill

July 29, 2010 by Sam Narisi

Here’s one example of the latest security threat to watch for — attacks on company-issued smartphones.  More…

PDFs are safe, right? Not anymore

July 27, 2010 by Steve Hannaford

There’s something about PDF files that makes users think they’re safe to open. And that’s exactly why they’ve become one of the preferred malware delivery vehicles for hackers. More…

Report: Antivirus software falling short

June 22, 2010 by Sam Narisi

Businesses rely pretty heavily on antivirus software to keep their networks safe. But is that software doing a good enough job? More…

Foxit Reader update protects against PDF attack

May 10, 2010 by Sam Narisi

As we reported last week, there’s a new malware attack carried out by malicious PDF files — and it can work even without exploiting a bug in the software. One PDF application has been updated to block the attack. More…

New malware campaign targets PDF flaws

May 3, 2010 by Sam Narisi

Computer users are being warned by several security companies to watch out for malicious PDF files. More…

E-mail from CDC? Look at it closely

December 11, 2009 by Sam Narisi

Security experts report there’s a new malware scam spreading through e-mails claiming to help recipients get a swine flu vaccine. More…

Most employees shopping online: What should IT do?

December 9, 2009 by Sam Narisi

‘Tis the season for virus threats and productivity drops due to online holiday shopping. More…

Survey: Cyber attacks increasing

December 8, 2009 by Valerie Helmbreck

Higher-ups balking at your proposed security budget? Results from a Computer Security Institute study may convince them your planned upgrades are necessary. More…

Are these 5 mistakes compromising your printer’s security?

August 11, 2009 by Sam Narisi


MFPs are constantly getting smarter and more “computer-like” — which makes them more vulnerable to the security risks that affect other devices. More…



  • How to Select a Web Host
    November 27, 2011 by marketing

    Creating a new website?  Not sure how to choose from among all the options?  Need shared hosting, small business hosting, or VPS hosting?  Lots of email accounts? 5-star reliability rating? Fortunately, there’s information available to help. The Best Web Hosts is great resource that will help you select the best web hosting company. It features reviews, rankings, and definitions that can help make your job of selecting a new web host more effective.

  • SMART Steps Towards Workload Automation
    January 19, 2010 by Luke Marchie

    Consolidating job scheduling into a single, comprehensive workload automation solution is a critical first step to effective Workload Automation (WLA).

    Download the free whitepaper here! More…

  • Identifying and Thwarting Malicious Intrusions
    January 12, 2010 by Luke Marchie

    Identifying and Thwarting Malicious Intrusions

    The phenomenal growth in social media has opened the door for all new malicious intrusions from gangs of cyber criminals. Utilizing the trusted relationships in social networking and benefiting from immature security and content controls, hackers are seeing increased performance in their attacks.

    Download the free whitepaper here More…

  • The Security Issues with Web 2.0
    January 12, 2010 by Luke Marchie

    The collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. With these technologies come new types of attack vectors.

    Download the free whitepaper here


  • Network-Critical Physical Infrastructure: Optimizing Business Value
    December 29, 2009 by Luke Marchie

    To stay competitive in today’s rapidly changing business world, companies must update the way they view the value of their investment in Network-Critical Physical Infrastructure (NCPI). No longer are simple availability and upfront costs sufficient to make adequate business decisions. Agility, or business flexibility, and low total cost of ownership have become equally important to companies that will succeed in a global, ever-changing marketplace.

    Download the free whitepaper here! More…

  • The New World of eCrime: Targeted Brand Attacks and How to Combat Them
    December 26, 2009 by Luke Marchie

    Nothing is more valuable to a business than its reputation. That is why brand attacks, which leverage a company’s valuable brand for nefarious purposes, must be battled on every possible front. Brand attacks are the new form of eCrime, and they’re being launched with new and rapidly evolving exploits, including phishing and—most recently—malware.

    Download the free whitepaper here! More…

  • DDoS: The Mother of All Cyber Threats
    December 16, 2009 by Luke Marchie

    DDoS: The Mother of All Cyber Threats

    Don’t wait until your business is targeted. A Forrester Consulting study commissioned by VeriSign revealed that nearly 75 percent of the 400 study respondents have experienced one or more DDoS attacks in the past year. Yet, most e-commerce businesses are not prepared for a large-scale DDoS attack. Could your business afford three or more hours of downtime? Avoid that revenue loss by registering for this free white paper

    Click here to download the free white paper More…

  • View more offers

    Quick Vote

    • Does your office have a color printer or copier?

      View Results

      Loading ... Loading ...

  • advertisement