One of the Apple's marketing lines for Macs has been that they do not suffer from the same virus infections that PCs have. This clearly has nothing to do with Macs being more stable than PCs, it is because fewer people own Macs than own PCs. Cyber-criminals are looking to infect as many machines as possible because this is how they create profit
SonicWALL Discusses the Spam 2.0 Threat
SonicWALL’s Patrick Sweeney and David Lee discuss a combined approach to stopping Spam 2.0, viruses and other malware.
New SonicWALL Comprehensive Anti-Spam Service
Ed Cohen announces a revolutionary new service for SonicWALL firewalls that blocks spam, viruses and malware.
Shift in how we store data may protect credit card information better
A recent article in CNN Money titled “Cybercrime: A secret underground economy” discussed the existence of organized crime in cyber-crime and how organized crime has turned cyber-crime into a multi-million dollar a year industry. The article provided some great insight into the black market of cyber-crime. The fact is, most of the organized crime has turned to cybercrime as the next generation of how they make money
Basic Security Tips part 2 – Effective passwords
A while back I published a post about locking your computer to make it safe. In this post we will discuss how to create passwords that are hard to crack but easy to remember to keep your personal computer, accounts and company network more secure. In an attempt to remember our work email password, our personal email password, our bank password, our network access password, etc
Aligning Compliance and Security
Compliance and security aren't the same, but they are often related, and even when they are at odds we need to accomplish both.
Basic Security Measures We Sometimes Forget to Use – Part 1
When talking about network security we concentrate on technologies and tactics network administrators can use to keep their organization protected. While this focus is important, even a company specializing in security can neglect to remind employees and others of some basic security measures. This post is the first in a series of posts detailing some basic security techniques for keeping your network, your identity and your computer safe
ASG Beta 7.490 Released
We have released 7.490 for our Beta testers. This can be considered the 7.500 Release Candidate which will be finalized as the GA in the future. As we move closer to our GA Version, we've taken the time to apply more fixes to the release and prepare it for general use.
The Public Cloud
I listen to NPR basically every time I'm in the car. Normally this gives me an ok sense as to what the rest of the world is thinking about. One show I am able to listen to regularly is “On Point”.
Why attack Twitter?
The recent high profile attacks on social networking sites such as Twitter and Facebook may give us a glimpse into the underground world of spammers, crackers, and those who style themselves as 'bot-herders'. As you're probably aware Twitter is a social networking site that allows users to generate short messages or 'tweets' which are then disseminated throughout the internet to a larger audience. The service started only a few years ago and since then its usage has exploded partly due to its high profile involvement in such recent events as the Iranian presidential election protests