EMC acquires Syncplicity
EMC has acquired privately held Syncplicity, a provider of native cloud-based sync and share capabilities required by enterprise customers. Terms of the transaction were not …
SaaSID launches Cloud Application Manager
SaaSID unveiled Cloud Application Manager (CAM), security software that provides single sign on (SSO), application shaping and auditing of any applications accessed using a …
High Performance MySQL
High Performance MySQL teaches you advanced techniques in depth so you can bring out MySQL’s full power. Learn how to design schemas, indexes, queries, and advanced …
Nmap 6 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …
Bogus Facebook apps could lead to Android malware
Bitdefender researchers have recently spotted something that could be the beginning of paid promotions through Facebook, and believe that the approach can very easily be used …
Instant decryption of MS Office 2010 documents now possible
Passware announced Passware Kit Forensic 11.7, which includes live memory analysis and subsequent decryption of MS Word or Excel 2007-2010 files. In addition, the new version …
Mistakes that led to the massive Utah data breach
A little over a month ago, the largest data breach in Utah history resulted in the compromise of Social Security numbers of some 280,000 Medicaid and Children’s Health …
Fake BBC website serves malware and a scam
Online scammers and malware peddlers know that the more afraid and desperate their targets are, the more likely it is that they will fall for their tactics, so their repeated …
Policy-based automation of storage provisioning
iWave Software announced iWave Storage Automator version 6, a storage automation software product that lets enterprise IT organizations and service providers deliver Storage …
Organizations struggling to enforce policies for managing records
Despite greater investments in their information management programs, most organizations still struggle with properly implementing those programs and getting employees to …
Fake Amex ID verification email leads to malware
A bogus American Express account ID verification email is currently doing rounds, trying to trick users into following the offered links: The email might look like a phishing …
Microsoft embraces CVRF format for its security bulletins
A year has passed since the Industry Consortium for Advancement of Security on the Internet (ICASI) introduced the first version of the Common Vulnerability Reporting …
Featured news
Sponsored
Don't miss
- Chrome, Edge users beset by malicious extensions that can’t be easily removed
- Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200)
- Scout Suite: Open-source cloud security auditing tool
- Steps to improve quality engineering and system robustness
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)