Seven Databases in Seven Weeks
Data is getting bigger and more complex by the day, and so are your choices in handling it. From traditional RDBMS to newer NoSQL approaches, Seven Databases in Seven Weeks …
Hackers leak customer data after firm refuses to pay ransom
Hacking collective “Rex Mundi” has leaked a batch of personal and financial information belonging to individuals who have applied for loans with online loan …
Compromised website serving “state-sponsored” 0-day exploit
The still unpatched Microsoft XML Core Services vulnerability (CVE-2012-1889) that allows attackers to gain the same user rights as the logged on user and execute malicious …
Online file sharing poses great security risks
As online file sharing becomes increasingly common as a business practice, SMBs are more at risk than ever before, according to Symantec. A new survey revealed that SMB …
Check Point releases new DDoS Protector appliances
Check Point introduced a new line of security appliances designed to fight DDoS attacks. The DDoS Protector appliances deliver multi-layered protection and up to 12 Gbps of …
Google detects 9500 malicious sites per day
Five years after it was first introduced, Google’s Safe Browsing program continues to provide an invaluable service to the 600 million Chrome, Firefox, and Safari users, …
Julian Assange asking for asylum in Ecuador
WikiLeaks founder Julian Assange has applied for political asylum at the Ecuadorian embassy in London on Tuesday, reports Wired. After having its final extradition appeal …
Worldwide security spending tops $19 billion
Globally small and medium business Security Market (on-premise and cloud) spend is expected to experience an overall compounded annual growth rate of over 10% for the period …
Flame was developed by US and Israel
Earlier this month, unnamed government sources seemingly confirmed that Stuxnet was developed through a joint effort of the US and Israeli government agencies. Two days prior …
Big Data skilled professionals in demand
The shortage of Big Data skilled professionals is driving the need for collaborative self-service access to Hadoop across companies of all sizes, according to Karmasphere. …
Securely open cloud apps to mobile devices
Layer 7 Technologies released the SecureSpan Mobile Access Gateway which simplifies how internal information gets exposed to mobile apps and developers while giving architects …
Facebook promotes security tips
If you have logged into Facebook in the last few days, chances are you have been faced with a new Facebook message at the top of your page saying “Stay in control of …
Featured news
Sponsored
Don't miss
- Browser backdoors: Securing the new frontline of shadow IT
- Key metrics for monitoring and improving ZTNA implementations
- Chrome, Edge users beset by malicious extensions that can’t be easily removed
- Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200)
- Scout Suite: Open-source cloud security auditing tool