Please turn on your JavaScript for this page to function normally.
Microsoft Windows Operating System Essentials

Windows 7 is the leading desktop software, yet it can be a difficult concept to grasp, especially for those new to the field of IT. Microsoft Windows Operating System …

Citrix releases open source cloud platform

Today Citrix announced the availability of Citrix CloudStack 3, the first release of the open source cloud platform under the Citrix brand. CloudStack is already the …

Kaspersky Lab unveils virtualization security solution

Kaspersky Lab announced Kaspersky Security for Virtualization, focused on protecting evolving corporate IT infrastructures from malware and cybercriminals. The solution …

TicketWeb customers subjected to phishing after hack

Customers of TicketWeb UK, the popular British website selling event tickets, are being warned not to fall for fake emails purporting to come from the service, asking them to …

Whitney Houston death video leads to scams

Cyber crooks often try to pique the users’ interest with fake news of a celebrity death but, unfortunately, sometimes they don’t have fake it. Pop diva Whitney …

Best practices for online banking security

There are two common misconceptions about online banking security which are holding financial institutions back from offering their customers the best services possible. …

Tax payers unaware of identity theft risks

While consumers remain concerned about identity theft, there are some common misconceptions about the risk of preparing and submitting their tax documents, and many are …

Mobile hacks to increase with SDR adoption

Digital Assurance warned that mobile communications operating over radio systems such as GSM, WiMax and DECT are likely to become more heavily targeted as Software Defined …

Storage migration without host and application downtime

Hitachi introduced a nondisruptive migration service capability that migrates from Hitachi enterprise storage to Hitachi Virtual Storage Platform (VSP) and eliminates host and …

Privacy pitfalls of online dating

It used to be that you were pretty much anonymous on the Internet if you chose to be, but those halcyon days are now gone, and you should think about whether it’s safe …

Inside Cyber Warfare, 2nd Edition

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare – without truly realizing the scope …

Week in review: pcAnywhere code leaked, Trustwave revokes “MitM” certificate, and top reasons for IT layoffs in 2011

Here’s an overview of some of last week’s most interesting news, articles and interviews: Compromised DreamHost-hosted websites lead to scams Hundreds of websites …

Don't miss

Cybersecurity news