The Malware Report show

The Malware Report

Summary: Anti-virus protection has changed. New forms of spyware, trojans, phishing, and run-time packers leave traditional anti-virus software, and your network, vulnerable. IT managers need new solutions to combat the ever changing threats to network security.

Podcasts:

 EMV "Smart Cards" 101 | File Type: audio/mpeg | Duration: 03:51

How will the new EMV chips in credit cards help protect your personal and financial data?

 Window XP Retires | File Type: audio/mpeg | Duration: 04:23

Microsoft has announced it will no longer support Windows XP, including technical support and security updates. Why it is critical for users to upgrade their operating system or computer immediately?

 Heartbleed Bug 101 | File Type: audio/mpeg | Duration: 04:27

Two-thirds of all websites use SSL to create a secure connection to users, but now the Heartbleed bug allows hackers to intercept the data from that connection with little evidence left behind.

 Security Tips For Patients | File Type: audio/mpeg | Duration: 03:46

With 45 percent of data breaches happening in the medical and healthcare field, what can patients do to keep their private information safe?

 Blackberry 10 Security | File Type: audio/mpeg | Duration: 05:43

With a focus on security, can Blackberry's new operating system 10 take some market-share away from the iPhone and Android based smartphones?

 SMB Security Basics | File Type: audio/mpeg | Duration: 04:40

Can small and medium sized businesses (SMB) protect their networks and data effectively on a limited budget?

 HIMSS Conference 2014 Insights | File Type: audio/mpeg | Duration: 04:20

HIMSS is the largest healthcare security conference in the world. Find out the trends that will change how healthcare is administered.

 RSA 2014 Highlights | File Type: audio/mpeg | Duration: 05:41

RSA is the largest gathering of security professionals and vendors in the world. Find out how trends in mobile security will change the way phones and tablets protect critical data and personal information.

 Myths Of The Target Breach | File Type: audio/mpeg | Duration: 04:17

Myths and conspiracies have risen from the ashes of the Target breach of 2013. What really happened?

 HIMSS 2014: Protecting Doctors Offices | File Type: audio/mpeg | Duration: 05:39

Many data breaches are happening at the healthcare facilities, so how can doctors protect client or patient information?

 HIMSS 2014: Protecting Medical Data | File Type: audio/mpeg | Duration: 06:04

With more healthcare and medical records being digitized and put across networks, what are the security issues that are becoming prominent in 2014?

 Online Dating Privacy And Safety | File Type: audio/mpeg | Duration: 05:01

What information should you disclose, and how do you know if who you are interacting with is who they say they are?

 Parental Controls And Technology | File Type: audio/mpeg | Duration: 04:37

There are many ways parents can help keep kids safe online, but some of the rewards might not be worth the risks.

 Protecting Kids On Social Media | File Type: audio/mpeg | Duration: 04:54

How can parents take an active role in keeping their kids safe online when using social media?

 Social Media And Online Predators | File Type: audio/mpeg | Duration: 04:16

With children becoming active social media users, new data shows online predators are getting more of their information on potential victims from social network profiles.

Comments

Login or signup comment.