Please turn on your JavaScript for this page to function normally.
Learning iOS Programming, 2nd Edition

Get a rapid introduction to iPhone, iPad, and iPod touch programming. With this easy-to-follow guide, you’ll learn the steps necessary for developing your first …

Six ways to improve SCADA security

Industrial control systems (ICS), distributed control systems (DCS), supervisory control and data acquisition systems (SCADA) have all been around for decades, but thanks to …

The current challenges of being a CISO

In the last decade or so, the role of Chief Information Security Officer (CISO) was established in the great majority of business, government and non-profit organizations, and …

Android security from the ground up

Georgia Weidman is a penetration tester, security researcher, and trainer. She’s also one of the speakers at the upcoming HITBSecConf 2012 Amsterdam conference. In this …

Free online tool teaches IT security procedures

AVG Technologies launched SMB BootCamp, a free, online tool to help SMBs demonstrate to customers that their company is seriously committed to following AVG’s …

Data breach vulnerabilities in the workplace

Many business professionals don’t realize that when their company’s confidential information is at risk, so too is the information of its clients, vendors, …

Google educates Gmail users on spam

Educating computer users about security is something that every online service should consider doing, and I’m glad to see that Google has started explaining why its …

Tips for backups in virtual environments

With the rate of virtualized servers being added to IT environments, organizations are facing new challenges in how to adequately protect data and ensure its recoverability …

Smartphone security checklist

While smartphones can make a significant and positive impact on those who embrace the technology, conversely the technology can wreak havoc on its users if they are …

The Basics of Digital Forensics

Computers, mobile devices and the Internet have become an integral part of our daily lives. They are helpful tools, but they are also sources of information that one would not …

Machine Learning for Hackers

If you’re an experienced programmer interested in crunching data, Machine Learning for Hackers will get you started with machine learning—a toolkit of algorithms that …

Multifunction printer hacking

A great number of multifunction printers of have the ability to integrate within a corporation’s business environment and connect to its email systems, its file systems, …

Don't miss

Cybersecurity news