Please turn on your JavaScript for this page to function normally.
Think Like a Programmer

The real challenge of programming isn’t learning a language’s syntax—it’s learning to creatively solve problems so you can build something great. In this …

Week in review: Android clickjacking rootkit, EU Parliament rejects ACTA, and Facebook’s contact-deleting API bug

Here’s an overview of some of last week’s most interesting news, videos and articles: Firewall management, IPv6 and you While the IPv6 protocol has been around for …

Spam campaigns using popular companies on the rise

In June, GFI threat researchers observed two fresh spam campaigns linking to Blackhole exploits which posed as confirmation emails from Twitter and Amazon. Delta Airlines …

Getting ahead of the security poverty line

Being stuck below the security poverty line isn’t about budget, it’s about attitude, motivation, and focusing not simply on basic compliance but rather on your …

Microsoft to release nine bulletins

The Microsoft Security Bulletin Advance Notification for July 2012 contains nine bulletins, with three listed as “critical” and six listed as …

Understanding IPv6, 3rd Edition

Get in-depth technical information to put IPv6 technology to work—including networks with hardware running Windows 8 and Windows Server 2012. Written by a networking expert, …

Security tips to stay safe this summer

PandaLabs published its security tips for consumers to stay safe this summer and avoid falling victim to computer fraud. During the summer, people (especially children) have …

Utility bill scam steals personal information

The President of the United States is not going to pay your utility bill. Atmos Energy is warning customers about the latest version of a scam that promises federal stimulus …

8,000+ mobile devices left at top U.S. airports

Credant Technologies announced the results of their survey of top airports in the United States. In the last year, travelers left behind 8,016 mobile devices at seven of the …

Securing apps and avoiding an explosive breach

Recent research from Veracode shows that 84 percent of web applications from American public companies are at risk of being hacked, despite more stringent compliance …

Bootable USB flash drive for secure remote working

Cryptzone released AppGate MOVE (My Own Virtual Environment), a USB flash drive that provides a portable way to access information and applications securely from any computer. …

Half of enterprise networks will be obsolete within five years

Technology trends such as BYOD, video and virtualization are rapidly consuming network capacity and capabilities, and 45 percent of the enterprise networks assessed during …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools