Please turn on your JavaScript for this page to function normally.
Security appliance market continues to grow

According to IDC, both factory revenue and unit shipments grew in the first quarter of 2012 marking the eighth consecutive quarter of year-over-year growth. Worldwide factory …

Samsung samples first 16GB DDR4 modules

Samsung has begun sampling the industry’s first 16GB DDR4, registered dual inline memory modules (RDIMMs), designed for use in enterprise server systems. Using …

Mastering Windows Network Forensics and Investigation

Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book …

Blackhole exploit kit got upgraded

Phoenix and Blackhole are the most popular and widely used exploit kits because their creators are always tinkering with them and pushing out update and improved attack …

Fake “Tax Refund” emails targeting UK citizens

The UK tax season came to an end in April, and notifications about tax returns have begun slowly trickling down to the country’s citizens. But unfortunately among those …

Fake Red Cross emails link to private PayPal account

A rather generic but well-crafted fake American Red Cross email has recently been hitting inboxes around the world and asking recipients for donations: As the offered link can …

Malicious emails target Uyghur activists, deliver backdoors

Highly targeted emails carrying a backdoor Trojan are currently directed at Uyghur activists, warn Kaspersky Lab and Alien Vault researchers. The former spotted emails …

ISACA issues COBIT 5 for Information Security

ISACA released COBIT 5 for Information Security, which builds on the COBIT 5 framework to provide practical guidance for those interested in security at all levels of an …

Microsoft SQL Server 2012 T-SQL Fundamentals

Get started with the fundamentals of Transact-SQL and learn how to write efficient and powerful database queries. With this hands-on guide, you’ll gain a solid …

Week in review: Investigating Android permissions, a new malware detection method, and a drastic decline in online vulnerabilities

Here’s an overview of some of last week’s most interesting news, interviews, videos and articles: App retrieving contactless credit card details pulled from Google …

12% of Fortune 500 infected with DNSChanger malware

IID announced that 12 percent of all Fortune 500 companies and four percent of “major” U.S. federal agencies are still infected with DNSChanger malware. These …

Radical reduction in online vulnerabilities

WhiteHat Security reviewed serious vulnerabilities in websites during 2011, examining the severity and duration of the most critical vulnerabilities from 7,000 websites across …

Don't miss

Cybersecurity news