• Why Last Year's Security Strategy Can't Protect You From Today's Threats

    ESET’s business security suite is engineered to find the most recent threats -- even those whose signatures have not yet appeared on malware lists, are disguised as legitimate software or that are…

  • Death of a Salesforce. Whatever Happened to Anti-Virus?

    Harley's article advocates multiple solutions that combine the best coverage and cost. The right, free anti-virus is a lot better than no protection, but the relatively low outlay for a competent…

  • Six months with Windows 8

    This paper is a six-month anniversary review of MS Window 8, including advantages and threats. There are 3 broad categories of Windows 8 devices: PCs, tablets, and smartphones. Windows 8 is on track…

  • Why Last Year's Security Strategy Can't Protect You From Today's Threats

    Spring 2013's "Why Last Year's Security Strategy Can't Protect You From Today's Threats" addresses the changing virus and malware threats.The piece notes the top 3 SMB security vulnerabilities: 1.…

  • Botnets of the mind

    Botnets of the Mind. Author David Harley discusses Botnets, hoaxes, chain messages, misinformation, misconceptions, chain letters, spam, victims, bot-infected machines, viruses of the mind, malicious…

  • Origin of the specious: The evolution of misinformation

    Human gullibility and suspended disbelief have been around forever. Malware authors have largely moved on from hobbyist after self-gratification to profiteers after big money. The identity of a hoaxer…