MCTS 70-680 Rapid Review: Configuring Windows 7
Assess your readiness for MCTS Exam 70-680—and quickly identify where you need to focus and practice. This practical guide walks you through each exam objective, providing …
Most parents secretly access teens’ Facebook accounts
For generations, parents have been suspicious of teens’ social activities – and have employed any number of tactics to uncover the truth. Today’s parents are …
New York top city for online fraud activity
New York is the nation’s epicenter for online fraudsters, followed by Atlanta, Chicago, Los Angeles, and Omaha respectively. Leveraging a sample of nearly a billion …
Flashback botnet decline not as fast as expected
Given the attention that the Flashback Mac malware has received since the discovery of the 600K strong botnet of computers infected with it and the number of tools that …
New firewall safeguards against medical-device hacking
Researchers at Purdue and Princeton universities have created a prototype firewall to block hackers from interfering with wireless medical devices such as pacemakers, …
Mobile phones expose businesses to massive risks
Organizations are failing to respond to the culture of employees using their own mobile devices for work and are opening up their systems to security risks. These are the …
Malware disguised as new Instagram Android app
Instagram, the popular free photo sharing app for iOS devices, is now available for download for Android users on Google Play and Instagram’s website. Unfortunately, a …
Portable encrypted Linux computing environment
SPYRUS announced a new version of Secure Pocket Drive that allows end users to build and distribute their own secure bootable Linux OS image. In addition to offering secure …
Oracle fixes 88 security vulnerabilities
Oracle’s Critical Patch Update for April 2012 fixes 88 security vulnerabilities across the product line. The amount of fixes isn’t really a big concern; it’s …
Tenable enhances Nessus Perimeter Service
Tenable Network Security announced the newest version of its Nessus Perimeter Service which extends the power of its vulnerability scanner to help businesses protect payment …
Switching to the Mac: The Missing Manual, Lion Edition
There’s never been a better time to switch to Mac OS X and David Pogue’s newly released Switching to the Mac: The Missing Manual, Lion Edition can help you do it. …
Active fake AV spam campaigns hit Twitter
Two distinct malicious spam campaigns are currently targeting Twitter users and taking them to compromised sites serving rogue AV and scareware software, warns GFI. The …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine