Please turn on your JavaScript for this page to function normally.
The Linux Command Line

Thanks to user-friendly distributions like Ubuntu, more people are running Linux than ever before. But many users stick to the GUI and point and click their way through tasks, …

Microsoft releases seven bulletins

2012’s first Patch Tuesday has seven bulletins, including the postponed bulletin from December 2011 that addresses the BEAST style information disclosure. Talking about …

Is your online bank vulnerable to currency rounding attacks?

In the 12+ years of doing penetration tests against various critical environments, we’ve seen numerous online banking servers and found all sorts of vulnerabilities in …

Spam emails link to QR codes

It was just a matter of time, and now it’s happening. The Websense ThreatSeeker Network has started spotting spam messages that lead to URLs that use embedded QR codes. …

Recycled cybercrime tactics adapted to conceal fraud

GFI Software released its VIPRE Report for December 2011, a collection of the most prevalent threat detections encountered during the month. Phishing campaigns once again …

Oracle Database Firewall extends support to MySQL

In an effort to assist organizations further prevent internal and external attacks from reaching their enterprise databases, Oracle released its Database Firewall which …

Netgear unites home networking and storage

A CES Innovations Design and Engineering Award Honoree, the NETGEAR Media Storage Router (WNDR4700) embodies the intersection of two of the most important consumer technology …

Biometric technologies for Android

Neurotechnology announced their new line of embedded biometric technologies, including VeriFinger Embedded SDK for fingerprint biometrics, VeriLook Embedded SDK for face …

Forensic email data analysis tool

DIGITS, a firm specializing in computer forensics and digital investigations, released Evidence Analyzer: Email Edition, which is designed to radically streamline the process …

5 reasons to enforce email monitoring

Managing storage continues to be one of the most significant challenges for email management, but the right tools can change this from a daily headache to an easy win. Email …

Mobile Security 6.0 for Android released

NQ Mobile released Mobile Security 6.0 for Android as a free download. This update offers Android users several new features to protect their privacy and financial …

Most unusual laptop recovery stories

Absolute Software Corporation takes a look back at some of its most unforgettable computer theft recovery cases. They’ve seen it all – helping local police to …

Don't miss

Cybersecurity news