Please turn on your JavaScript for this page to function normally.
First sub-$50 cloud router

D-Link introduced the first sub-$50 Wi-Fi router with advanced cloud services – the new D-Link Cloud Router (DIR-605L). In addition to bringing cloud-enabled devices to …

Google Docs hosted phishing schemes abound

Google Docs is a helpful office suite and data storage service that allows users to collaborate on documents with ease but, unfortunately, it is also a very useful tool for …

San Francisco City College systems infected for over a decade

Computers and servers of the City College of San Francisco have been discovered to be infected with a myriad of computer viruses and information-stealing malware, and some of …

Week in review: Currency rounding attacks, Trustworthy Computing Initiative anniversary, and how to foil targeted attacks

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Most unusual laptop recovery stories From the good, the bad, and …

Reactions from the security community to the Trustworthy Computing Initiative

This week, Microsoft is celebrating 10 years of its Trustworthy Computing Initiative (TwC). One of the most well-known outcomes of Trustworthy Computing is the Microsoft …

10 years of Microsoft’s Trustworthy Computing Initiative

Ten years ago this week, during a time when security problems were threatening trust in software products, Bill Gates sent an email to all Microsoft full-time employees …

Chinese using malware to attack US DoD smart card security

AlienVault found evidence of Chinese-originated attacks against the US government agencies including the US Department of Defense (DoD), which use a new strain of the Sykipot …

Volume and sophistication of attacks to increase

Based on activity levels observed in the second half of 2011, the growing pace, volume and sophistication of attacks suggest consumers, small businesses and corporations will …

Identity intelligence and the complexity of security

An employee’s unauthorized access to client information can leave a firm vulnerable to security breaches and audits. Many companies juggle the administration of …

Secure web gateway protection from Sophos

Virtualization has helped organizations reduce capital and operating costs, while driving greater levels of application availability. It has also yielded benefits in …

Microsoft SharePoint 2010: Deploying Cloud-Based Solutions

Take your Microsoft SharePoint solutions to the cloud and gain scalability and high availability while helping to lower your operational costs. Led by a SharePoint expert, …

FreeBSD 9.0 released

The FreeBSD Release Engineering Team is announce the availability of FreeBSD 9.0 that adds many new features. The release is now available for the amd64, i386, ia64, powerpc, …

Don't miss

Cybersecurity news