Charlotte, NC – Calyptix Security, a leading provider of network security and management devices for small and medium business, today announced expanded spam filtering functionality to its flagship security device, … Continue reading
POS malware is breaking through defenses at retailers across the nation -- but why are POS systems so vulnerable? And how can you stop this threat?
See 5 reasons why POS malware is winning the battle and 18 ways you can boost POS security to block it.Continue reading
Charlotte, NC – Calyptix Security Corp., a leading provider of network security and management tools, today announced that its flagship security solution, AccessEnforcer, now supports mobile VPN connections. The latest … Continue reading
Basic wireless router security is terrible and it may be getting worse. We review the results of a hacker contest that found 15 zero-day vulnerabilities in popular SOHO routers.
See which router models are affected, and find out why most of these vulnerabilities have risen from the grave.Continue reading
Healthcare IT departments are required to protect patient data under HIPAA -- but a new SANS report shows many health organizations are compromised.
Find out more about what the report calls a "compliance nightmare on the horizon" for healthcare IT security.Continue reading
Are basic wireless routers a cheap solution or a massive liability? Find out the six reasons why you never want to depend on a wireless router to protect your network.
Inside, you’ll see how some of the most popular routers being sold today can have massive security flaws, and how wireless router security flaws are caused.Continue reading
Small office and home office routers (SOHO) can have so many security flaws that a hacker contest has been started to highlight the issue. The contest awards prizes to hackers who can discover new vulnerabilities in 10 popular routers.
What a great time to cover router security! In this post, you get 12 ways to improve the security of your wireless router, and you'll see why it might be best to leave the "routing" of network traffic to another device.Continue reading
Is Cryptolocker really dead? Some researchers have doubts -- even as new types of ransomware continue to attack computers across the globe.
In this post, you'll get an update on Cryptolocker and say "hi" to a new, potentially stronger brand of ransomware: Critroni.Continue reading
The war against malware and malicious websites never ends. But with a little intel and some firepower, your team can keep your office and your clients safe.
See the top 10 ISPs that host the most malware. Also find out which countries are rising in the malware market and which file types to watch out for.Continue reading