While honeypots are still the widely used tactic to mislead and "bait" hackers, organizations are moving toward the use of newer technologies that can trace and deceive cybercriminals.
Showing results 1 to 20 of 77
U.S. network equipment vendor offering deception-based security system which misleads hackers, such as to dead ends or false information.
The data explosion is upon us. Big data analytics is supposed to help us sift through it all. Can it also help keep enterprise hackers at bay? We talk to the founders of Seculert.
Hewlett-Packard exec says developers' poor grasp of security practices when building cloud-based enterprise software could lead to code having loopholes hackers can exploit.
There're pros to actively defending corporate networks from cyberattacks by creating "honeypots" and other distractions, but most companies unlikely to have budgets or right manpower to do so, observers note.
Enterprise businesses wrestling against hackers for control of their network infrastructure are fighting a losing battle by attempting to build and manage their own security infrastructure, according to Hewlett-Packard (HP).
Poorly secured infrastructure, rather than malware, is to blame for allowing hackers into enterprise servers to carry out cyberattacks on large-scale systems, according to a Verizon Business exec
Hackers can use booby-trapped PDF attachments sent to BlackBerry devices to launch malicious code execution attacks, according to warnings issued by Research in Motion (RIM).The company shipped patches this week to address a pair of critical vulnerabilities affecting its enterprise product line.
Research in Motion has released a patch for a security flaw in BlackBerry Enterprise Server, which exposed corporate networks to hackers via a maliciously crafted PDF document
Code inspector Ounce Labs has identified two vulnerabilities in the open source Spring framework that exposes their enterprise applications to would-be hackers and hijackers.The two issues, ModelView Injection and Data Submission to Non-Editable Fields, affect only the MVC module of the Spring framework, which is used to build enterprise web applications.
While e-business may have slumped, online vandalism has been booming, so much so that Attrition.org can no longer keep up with the number of Website defacements
A white knight or bad code? Opinion varies
VBS.Hard.A is latest VBS worm in the wild
Hours after being suspended for hacking into school district network, American boy hangs himself
The worldwide flood of emails caused by the virus is starting to dry up, say antivirus experts, less than 24 hours after the malicious attachment first went out
At the time of posting there were no virus updates available for the Homepage worm, but there a number of simple steps you can take to help protect yourself
Just days after Microsoft released a patch for a dangerous security hole in IIS 5.0, a hacker releases a program to circumvent it
An FBI operation to obtain evidence on two Russian hackers, from servers based in Russia, could give intelligence angents free reign to hack computers outside the US
Net activists speak out against May Day panicmongering by security firms
Hacker threat counteracts economic downturn to keep security industry healthy
The best of ZDNet, delivered
- 1 ZDNet Cloud TV: Hurdles to overcome (highlights)
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 34 ways to improve your iPhone's battery life
- 4 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 5 So you have an app idea and want to make a bajillion bucks