Please turn on your JavaScript for this page to function normally.
Firewall management, IPv6 and you

Created 30 years ago, IPv4 has a 32-bit addressing scheme and can support approximately 4.3 billion devices connected directly to the Internet. Well aware that IPv4 addresses …

ISACA issues COBIT 5 for Information Security

ISACA released COBIT 5 for Information Security, which builds on the COBIT 5 framework to provide practical guidance for those interested in security at all levels of an …

Microsoft SQL Server 2012 T-SQL Fundamentals

Get started with the fundamentals of Transact-SQL and learn how to write efficient and powerful database queries. With this hands-on guide, you’ll gain a solid …

Week in review: Investigating Android permissions, a new malware detection method, and a drastic decline in online vulnerabilities

Here’s an overview of some of last week’s most interesting news, interviews, videos and articles: App retrieving contactless credit card details pulled from Google …

The fluctuation of compliance

After this weekend, all retailers accepting payment card transactions will be expected to either use a specialized firewall for protecting their Web applications or to have …

12% of Fortune 500 infected with DNSChanger malware

IID announced that 12 percent of all Fortune 500 companies and four percent of “major” U.S. federal agencies are still infected with DNSChanger malware. These …

Radical reduction in online vulnerabilities

WhiteHat Security reviewed serious vulnerabilities in websites during 2011, examining the severity and duration of the most critical vulnerabilities from 7,000 websites across …

Scientists reveal new malware detection method

Scientists from NQ Mobile’s Mobile Security Research Center, in collaboration with North Carolina State University disclosed a new way to detect mobile threats without …

Online behavioral tracking often violates privacy practices

Keynote Systems announced the results of an in-depth analysis of online behavioral tracking on 269 Websites across four industries – News & Media, Financial …

User activity monitoring for Windows and OS X

SpectorSoft released SPECTOR 360 7.4, user activity monitoring software for Mac and Windows networks. The software provides visibility into and analysis of the digital …

Secunia PSI 3.0 released

Secunia announced the availability of Secunia PSI 3.0, a free computer security scanner which identifies software applications that are insecure and in need of security …

Do passwords matter?

You don’t have to look very hard to find an article discussing password breaches. Recently, there was a lot of buzz around LinkedIn, Last.fm, and eHarmony, three very …

Don't miss

Cybersecurity news