Please turn on your JavaScript for this page to function normally.
Network Management: Principles and Practices, 2nd Edition

Network Management: Principles and Practices, 2nd Edition is thoroughly updated and expanded to address broadband network management and the latest trends in the network …

Week in review: Java 0-day finally patched, and fast and furious reverse engineering

Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: Fast and furious reverse engineering Tomislav Pericin is one of …

Virus shuts down gas company’s site and offices

The official website and the email servers of Ras Laffan Liquefied Natural Gas Company – the world’s second largest liquefied natural gas company which distributes …

Fake UPS notices deliver malware

Cyber crooks have once again resurrected the old UPS spam email campaign in order to deliver their malicious wares to Internet users, warns Webroot’s Dancho Danchev. As …

Oracle patches Java 0-day, researchers say there’s another one

Oracle has finally issued an update for Java 7 (v 1.7.0_07) which solves the problem of the CVE-2012-4681 vulnerability (which actually consists of two distinct flaws). The …

Chimera: A declarative language for streaming network traffic analysis

Intrusion detection systems play a vital role in network security. Central to these systems is the language used to express policies. Ideally, this language should be …

Effective MySQL Backup and Recovery

Effective MySQL: Backup and Recovery offers a no-nonsense approach to one of the most critical tasks of an operational DBA—performing, testing, and verifying backup and …

AV-killing worm spreads via Facebook chat and IM clients

A rather industrious piece of malware that – among other things – paves the way for other malware by disabling AV solutions and software update modules has been …

Kaspersky Lab publishes research about Wiper

In April 2012 a series of incidents were publicly reported about a destructive malware program, codenamed Wiper, which was attacking computer systems related to a number of …

Cross-platform Wirenet Trojan targets Mac and Linux users

Since Windows users constitute the majority of computer users around the world, most malware is designed to target that particular OS and software made for it. Still, every …

Cybercriminals use throw-away domains to infiltrate enterprise networks

The first six months of 2012 saw continued increases of malicious infection activity and an intensified danger of email-based attacks as cybercriminals increasingly employed …

Java 0-day exploit served from over 100 sites

The problem of the two unpatched Java zero-day vulnerabilities that are actively exploited in the wild by attackers looking to gain access to their targets’ computers is …

Don't miss

Cybersecurity news