Please turn on your JavaScript for this page to function normally.
How to make smart grids

A smart grid is an upgraded electricity network with two-way digital communication between supplier and consumer. The adoption of smart grids will change the distribution and …

The growing headache of protecting mobile devices

33 per cent of UK organizations foresee the protection of mobile devices in the workplace to be the biggest security headache they will encounter in the year ahead, according …

KeePass Password Safe 1.23 released

KeePass Password Safe is a free, open source, light-weight and easy-to-use password manager for Windows, Linux, Mac OS X and mobile devices. You can store your passwords in a …

Panda Security launches Panda Cloud Systems Management

Panda Security released Panda Cloud Systems Management, a remote management and monitoring solution designed to manage, monitor and maintain IT resources. The solution allows …

Secure cloud-based email service

Perimeter E-Security introduced a new offering that enables email users to easily access and search their entire mailbox archive on virtually any device, whether they are in …

Hacking Exposed 7: Network Security Secrets and Solutions

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today’s most devastating attacks and proven countermeasures. The 7th …

Week in review: Yahoo password leak, multi-platform backdoor, Microsoft revokes its code-signing certificates

Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: Worldwide IT spending to surpass $3.6 trillion in 2012 In …

NVIDIA and Android forums hacked, user credentials stolen

Following the high-profile breach of one of Yahoo’s subdomain servers and the resulting leak of over 450,000 passwords stored in clear text in one of the exfiltrated …

Big brands utilized in malware distribution

Commtouch security analysts have seen substantial continued blending of big brand names with malware. Researchers named the following top seven brands that were abused in …

Majority of small businesses not confident in network security

More than half of IT administrators at small businesses would not bet their own money that all of the computers their business owns and employees use are free of malware (51%) …

VKernel announces integration support with Microsoft System Center 2012

VKernel released the integration compatibility between its vOPS Server product line and Microsoft System Center 2012. This integration adds capabilities to Microsoft System …

The use of exploit kits changed spam runs

Spammers used to depend on email recipients to tie the noose around their own necks by inputing their personal and financial information in credible spoofs of legitimate …

Don't miss

Cybersecurity news