Please turn on your JavaScript for this page to function normally.
Unattended Linux VM configuration tool for Hyper-V

Set-LinuxVM is a tool provided as a Windows PowerShell module which is able to create Linux Virtual Machines on a Hyper-V host. It supports Debian, Ubuntu, CentOS, Fedora, …

Five ways to migrate applications to the cloud

Organizations seeking to move applications into the cloud have five options: rehost on infrastructure as a service (IaaS), refactor for platform as a service (PaaS), revise …

Chromebook: A new class of risks

We are certainly living in interesting times. It was less than a week ago that a rumor appeared that Apple is going to switch to ARM processors for its next generation of …

The rise of rogue AV

April saw a continued increase in the volume of detected malware, with 73,000 new variants of threats being released daily – a 26 percent increase over the same period …

Automated solution for patching software vulnerabilities

A universal law enforcement axiom states that criminals prefer to trespass through vulnerable open or unlocked doors or windows. In the IT and software industries, the same …

Free check verification and validation of bank accounts

Recent Federal Trade Commission activity is undeniable evidence for increased concern of the public in connection with unauthorized check creation and fraud conducted by …

Week in review: Leaking Facebook apps, Chrome sandbox cracked and explosion of Android malware

Here’s an overview of some of last week’s most interesting news, interviews, videos and articles: Files uploaded to file hosting services accessed by malicious …

Tips for guarding against mobile malware threats

In order to guard against growing mobile malware threats, Juniper Networks offers the tips below. For consumers: Install an on-device anti-malware solution to protect against …

Phishing attacks rise year over year

Phishing attacks in Q1 2011 increased significantly compared to Q1 2010, according to IID. Criminals utilized phishing scams 12 percent more from January to March 2011 than …

HP Intelligent Management Center multiple vulnerabilities

Multiple vulnerabilities have been reported in HP Intelligent Management Center (IMC), which can be exploited by malicious people to compromise a vulnerable system, according …

Free credit and identity theft protection service

TrustedID launched IDSafe, a free consumer credit and identity theft protection service to provide core coverage at absolutely no cost. IDSafe provides consumers a free credit …

WatchGuard introduces next-generation firewall

WatchGuard unveiled its most powerful security appliance, the XTM 2050. This next-generation firewall (NGFW) providessecurity for large organizations and data centres that …

Don't miss

Cybersecurity news