Please turn on your JavaScript for this page to function normally.
Linux Pocket Guide, 2nd Edition

If you use Linux in your day-to-day work, this popular pocket guide is the perfect on-the-job reference. The second edition has expanded from Fedora-only coverage to …

Fake account verification email phishes for Google credentials

Once again, Google users are being targeted with emails purportedly coming from the Google Team, confirming a bogus recovery e-mail update: Seeing the threat of a permanent …

Microsoft released six comprehensive security updates

This month Microsoft issued six bulletins, four critical, two important, addressing 11 distinct vulnerabilities. Organizations should focus most of their attention on …

Email campaigns still targeting pro-Tibetan orgs

Malicious Tibetan-themed email campaigns are still going strong, targeting pro-Tibetan organizations and making them inadvertently install malware on their machines. The …

Utah data breach numbers 750K+ victims

Social Security numbers of some 280,000 Medicaid and Children’s Health Insurance Plans users and “less sensitive” information on 500,000 more of them has …

600K strong Flashback botnet comprises mostly Macs

There has been a lot of talk and speculation about the size of the botnet formed by computers targeted with the Flashback malware and whether all these machines were, in fact, …

An unsecured computer is worse than an unlocked home

Using a computer without security is riskier than leaving your home or car unlocked. In a survey of 1,637 Internet users aged 18 and older, Webroot asked respondents to gauge …

Poor internal security processes spell disaster

Poor internal security management processes present more risk than malicious threats. More than 50 percent of an AlgoSec survey respondents incurred a system outage due to an …

Mobile devices expose company data to vulnerabilities

Mobilisafe announced results of its SMB focused study. As part of a private beta program, participants evaluated a product that assesses the security risk of mobile devices …

Linksys Wi-Fi routers with app enabled capabilities released

Cisco unveiled a new line of Linksys Smart Wi-Fi Routers with app enabled capabilities. The three new routers offer support for Cisco Connect Cloud, which provides anytime, …

Smart meters vulnerable to false data injection

Power grids connect electricity producers to consumers through interconnected transmission and distribution networks. In these networks, system monitoring is necessary to …

Establishing a GRC program with Keylight Platform

LockPath released Keylight Platform 2.3 which gives users the ability to upload data files (.xls and .csv) and import them directly into DCF tables. In addition, Threat …

Don't miss

Cybersecurity news