Please turn on your JavaScript for this page to function normally.
The Official Ubuntu Book, 7th Edition

Ubuntu is a complete, free operating system that emphasizes ease of use, community, and support while enhancing speed, power, and flexibility. It is designed for everyone from …

Hackers allegedly breached Saudi Aramco again

Saudi Aramco, the national oil company of Saudi Arabia and the biggest oil company in the world, has issued a statement announcing that it has restored all its main internal …

Splunk delivers operational intelligence for the cloud

Splunk announced Splunk Storm, a cloud service based on the Splunk software and is for organizations that develop and run applications in the public cloud, using services such …

Fake Facebook photo notifications carry malware

Fake Facebook notifications informing users that a friend has posted a new photo of them on the social network have been spotted hitting inboxes around the world. The emails …

Trend Micro Deep Security 9 released

Trend Micro announced Deep Security 9, a server security platform designed to provide server, application and data security across physical, virtual and cloud environments …

Map of state data breach notification laws

Current state data breach notification laws are strikingly similar but vary in compliance requirements for businesses, with all laws highlighting the need for companies to …

Safeguard Facebook photos with McAfee Social Protection

McAfee announced the availability of a free public beta of McAfee Social Protection, a new app for Facebook that protects users’ photos from being shared without their …

BYOD is not for every company, or every employee

The rise of bring your own device (BYOD) programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace, according …

What keeps information security leaders awake at night

In this interview, Herbert ‘Hugh’ Thompson, Program Committee Chair for RSA Conferences and Chief Security Strategist at People Security, talks about challenges …

iAlertTag wirelessly secures, alerts, and locates your iPhone

Cirago International released its new iAlertTag (IAT1000), a solution for finding a lost iPhone, keeping an iPhone close by or locking your Windows laptop. iAlertTag creates a …

Intel partners with VMware for cloud security

Although companies are expanding their use of cloud computing to realize improved agility and efficiencies, concerns about security remains a top barrier to adoption. Intel …

Hackers leak information stolen from over 100 sites

Hacker collective Team GhostShell has posted on Saturday on their Twitter account links to a massive leak that supposedly includes over one million of user record sets stolen …

Don't miss

Cybersecurity news