Please turn on your JavaScript for this page to function normally.
Google+: The Missing Manual

If you want to gain more control over your social networking activities with Google+, this jargon-free guide helps you quickly master the ins and outs of the site. Learn how …

IT managers express concerns over tablet security

Cisco commissioned a survey 1500 IT managers and executives in the US, Canada, UK, France, Germany and Spain to assess attitudes, fears and hopes for tablets in the workplace. …

Criminals stole $3.4B from online revenues in 2011

Merchants are making gains against fraud but the battle continues, according to CyberSource, a Visa company. The fraud rate by order (the percentage of orders that turned out …

Security for virtualized and cloud computing

Catbird announced vSecurity 5.0 that integrates directly with the hypervisor to provide automated control, visibility and efficiency. Its vCompliance engine monitors and …

Unique Web malware hosts increase

The proper security tools can prevent infection or stop outbreaks, mitigate or reduce losses from malicious events, and even decrease legal liability. These products can also …

Interactive networking stack debugger

The new P+ 1000 embedded packet debugger provides ability to control and interact with networking designs and is priced for the individual engineer. It offers packet-by-packet …

Network Security First-Step, 2nd Edition

With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively …

Secure collaboration for iPad and iPhone

WatchDox, a provider of secure document access and collaboration solutions, today announced that its users can now securely view and make annotations to documents directly on …

Advanced malware protection with Sourcefire FireAMP

Sourcefire introduced FireAMP advanced malware protection, a malware discovery and analysis solution that analyzes and blocks malware by utilizing big data analytics. Designed …

Tool used in Anonymous Megaupload campaign

Once again, Anonymous is using the low orbit ion canon (LOIC) to DDoS websites. This tool was developed by white hat hackers to stress test websites. Not surprisingly, the …

New Infrastructure as a Service federation platform

6fusion released its next generation UC6 Infrastructure as a Service (IaaS) federation platform. The new version features a completely redesigned web user interface, along …

Low Tech Hacking

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that …

Don't miss

Cybersecurity news