Please turn on your JavaScript for this page to function normally.
Protect your online image with tips from Microsoft

In observance of Data Privacy Day 2012, Microsoft is releasing new data about consumer behaviors online and is offering guidance and tips to help people better manage their …

Malicious QR codes and the persistence of rootkits

Cybercrime has come a long way since it was mostly a digital form of vandalism. It has developed into a criminal business operated for financial gain and is now worth …

Endpoint security through whitelisting

The latest release of McAfee Application Control is integrated with McAfee Global Threat Intelligence to show the file reputation of every file in the enterprise. This feature …

Computer Security Fundamentals, 2nd Edition

This book brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. It …

Organizations to replace BI functions with cloud offerings

Nearly one third of organizations either already use or plan to use cloud or software-as-a-service (SaaS) offerings to augment their core business intelligence (BI) functions, …

“Chuck Norris is dead” Facebook scam

Chuck Norris, the popular martial artist/ actor whose “tough guy” image has spawned a countless jokes and memes on the Internet, has been killed off by Facebook …

Carberp Trojan targets French broadband subscribers

Last year, Carberp emerged on the online banking fraud scene as a competitor to the dominant financial malware platforms Zeus and SpyEye. Trusteer recently discovered a …

Securely upload data to the AWS cloud

Amazon announced AWS Storage Gateway, a service that provides a new option to securely upload data to the AWS cloud. The AWS Storage Gateway connects an on-premises software …

Targeted attacks will change the economics of security

Today, European Justice Commissioner, Viviane Reding, will unveil the new European Privacy Directive, designed to safeguard personal, identifiable information that is stored …

IT industry business confidence remains flat

IT companies express tempered optimism heading into the first quarter of the year, though longer-term prospects look more promising. CompTIA projects a worldwide IT industry …

Cloud-based fuzzing for zero-day vulnerability discovery

Codenomicon released the Fuzz-o-Matic cloud-based software security Testing-as-a-Service (TaaS) platform for enterprise software and applications running on Windows, Linux, …

Comprehensive Java testing solution

Parasoft introduced a new release of Parasoft Jtest: a comprehensive Java testing solution that automates static analysis, unit testing, coverage analysis, runtime error …

Don't miss

Cybersecurity news