A New Trojan Threat on Mac OS X Comes From Facebook

SecureMac has discovered a new Trojan that affects all Mac OS X versions even the 10.7 Lion and it is being distributed through email and social networks like Facebook, posing as a video linked from a message with the title “Is this you in this video?”. When a user clicks on the link, the Trojan… Continue reading A New Trojan Threat on Mac OS X Comes From Facebook

A Review of the Comodo Internet Security Suite 4.0

Should your computer lack either firewall or antivirus protection, you are risking your personal data to malware.  You should install security to protect both yourself and the internet community: Comodo Internet Security Suite 4.0 provides antivirus and firewall security as well as a Social Authentication toolbar for your browser.  The security it provides is unconventional,… Continue reading A Review of the Comodo Internet Security Suite 4.0

U.S. Government planning to make Computers Safer Online

United States government is these days appraising an Australian plan that will allow the internet service providers to warn all their clienteles base if any of the their computers are either taken over by hackers or crackers, and also limit the online access of these computers till the time people don’t fix the pending problem.… Continue reading U.S. Government planning to make Computers Safer Online

Differentiating Public, Private and Hybrid Cloud Computing Environments

In its current form, cloud computing has been around for a few years now, yet many are still confused by the terminology used to describe the various types of clouds. This has not been helped by private software and hardware vendors inventing terms to attempt to appeal to corporate IT departments everywhere. As they saw cloud computing taking off, they attempted to exploit fears as to its security by offering solutions that really don’t have anything to do with the cloud except for a made-up name. Here, we’ll attempt to cut through the noise and give a basic primer as to the types of clouds and their potential uses.

Review: Ad-Aware Pro Internet Security 8.3

As Ad-Aware was the first anti-spyware utility when it was released by Lavasoft in 1999, there’s a fairly good chance you’ve already used it at one time or another. More recently, it has been updated to deal with other types of threats too, such as rootkits, trojans,and viruses. Ad-Aware Pro Internet Security 8.3, the most… Continue reading Review: Ad-Aware Pro Internet Security 8.3

Developing a Security Program

Have you ever heard the statement, “Networks evolve”? Ask any System Administrator whether they think this statement has merit and most will agree. The company grows, and one server turns into two which turns into ten; or, one location turns into five, and before you know it, your network has evolved into its own entity. This post is intended to give you examples and provide reasons why a sound security plan is so important. The following will provide you with an outline for how to develop and implement a security program for your organization and/or clients.