Please turn on your JavaScript for this page to function normally.
Unattended Linux VM configuration tool for Hyper-V

Set-LinuxVM is a tool provided as a Windows PowerShell module which is able to create Linux Virtual Machines on a Hyper-V host. It supports Debian, Ubuntu, CentOS, Fedora, …

Five ways to migrate applications to the cloud

Organizations seeking to move applications into the cloud have five options: rehost on infrastructure as a service (IaaS), refactor for platform as a service (PaaS), revise …

Chromebook: A new class of risks

We are certainly living in interesting times. It was less than a week ago that a rumor appeared that Apple is going to switch to ARM processors for its next generation of …

Automated solution for patching software vulnerabilities

A universal law enforcement axiom states that criminals prefer to trespass through vulnerable open or unlocked doors or windows. In the IT and software industries, the same …

HP Intelligent Management Center multiple vulnerabilities

Multiple vulnerabilities have been reported in HP Intelligent Management Center (IMC), which can be exploited by malicious people to compromise a vulnerable system, according …

BackTrack 5 released

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …

Run OS X, Windows and Linux side-by-side on a Mac mini

Parallels Server for Mac 4.0 Mac mini Edition lets businesses turn an Apple Mac mini server running Mac OS X Server into a multi-purpose platform capable of running Mac OS X, …

GFI MailEssentials Complete released

GFI Software launched GFI MailEssentials Complete, an anti-spam, anti-phishing and email security solution for SMBs which gives organizations an email security solution they …

Enhance mobility and security at branch offices

Cisco announced new solutions that continue to enhance mobility and security at branch offices without adding new in-branch hardware or support burdens. Using cloud deployment …

Free browser-based security assessment

Shavlik Technologies announced a new browser-based security advisory that helps identify potential security vulnerabilities on a network. Shavlik Security Advisor scans all …

Cloud-based protection for virtualized environments

Panda Security launchd Panda Virtual GateDefender Performa which delivers cloud-based protection for VMWare virtualized environments. Companies can now protect their perimeter …

Skype for Mac message processing code execution vulnerability

Pure Hacking, a group of ethical hackers in Australia, reported directly to Skype what they believed to be a zero-day vulnerability in Skype for Mac 5.x The vulnerability in …

Don't miss

Cybersecurity news