Cisco Blogs

Search Results

363 posts found

ZeuS: Getting a Taste of its Own Medicine?

…ealing banking credentials and money from its victims, it may be showing some promising signs of weakness to the security community. While it has long been recognized as a modular and adaptable platform, the rising complexity in the system may be exposing it to security concerns found in traditional enterprise software. Identifying and exploiting these weaknesses may be an essential factor in disrupting its botnets and tracking down its controll…

Read More >>

Tags: ,

A Special October for Cyber Security

Stop. Think. Connect. It’s the main theme for cyber security awareness that you and I will hear again and again. October is National Cyber Security Awareness Month, led by the National Cyber Security Alliance (NCSA). Founded by volunteers from 7 companies in 2001, NCSA has grown into a strong cyber security advocate and a great example of public and private partnerships.  Last year alone, NCSA reached out to an estimated 40,000,000 people throug…

Read More >>

Tags: , ,

Cisco Security Tracks LinkedIn Spam Attack

Starting this morning—Monday, September 27, at 10am GMT—cyber criminals sent spam email messages targeting users of the LinkedIn social media community. This is the largest such attack known to date. In the attack, victims are emailed an alert that contains a link with a fictitious social media contact request. This morning, these messages accounted for as much as 24% of all spam sent within a 15-minute interval. Clicking the…

Read More >>

Tags: , , , ,

Security Intelligence Operations Portal: A New Look for a Trusted Resource

…urity events, such as the biannual Cisco IOS Software Advisory bundled publication and Microsoft’s monthly security updates, into a single resource so you can readily assess threats to your network Security White Papers and Best Practices that detail leading security tools and techniques that can make networks more secure and individuals more knowledgeable and effective Weekly Cyber Risk Reports that highlight industry and world events rele…

Read More >>

Protecting your small business starts with email security

…but it definitely starts with locking down all possible entry points; physical and virtual. You need to install security devices and software at every point on your network by which someone from the outside could gain access to your company data. For most small businesses, the first place to start is email security. Results from the recently released Cisco 2010 Midyear Security Report indicate the need for increasing vigilance in battening dow…

Read More >>

Tags: , , , , ,