Please turn on your JavaScript for this page to function normally.
Questioning of incoming data crucial for security awareness

In the last six-to-twelve months, we have witnessed many different cyber attacks. Hacktivists were making a statement, the players behind the so-called Advanced Persistent …

iPhone: The Missing Manual

With the iOS5 software and the new iPhone 4S device, Apple has another world-class hit on its hands. This pocket computer comes with everything—cellphone, iPod, Internet, …

PCI pitfalls for retailers

Businesses that process, transmit or store cardholder data must implement security controls as defined by the latest PCI DSS standard. The following are the nine common PCI …

Top disaster recovery issues

It is no surprise that disaster preparation is top of mind among people these days. The images and stories coming out of Japan following the devastating earthquake and tsunami …

Volume and sophistication of attacks to increase

Based on activity levels observed in the second half of 2011, the growing pace, volume and sophistication of attacks suggest consumers, small businesses and corporations will …

Microsoft SharePoint 2010: Deploying Cloud-Based Solutions

Take your Microsoft SharePoint solutions to the cloud and gain scalability and high availability while helping to lower your operational costs. Led by a SharePoint expert, …

Easy ways to protect your privacy and data

In spite of one high profile computer security breach after another, many people are still not employing even the most basic safeguards to protect their privacy and their …

The Linux Command Line

Thanks to user-friendly distributions like Ubuntu, more people are running Linux than ever before. But many users stick to the GUI and point and click their way through tasks, …

5 reasons to enforce email monitoring

Managing storage continues to be one of the most significant challenges for email management, but the right tools can change this from a daily headache to an easy win. Email …

CompTIA Network+ N10-005 Authorized Cert Guide

CompTIA Network+ N10-005 Authorized Cert Guide is an exam study guide. Best-selling author and expert instructor Kevin Wallace shares preparation hints and test-taking tips, …

EFF: Don’t use the new AOL Instant Messenger

The Electronic Frontier Foundation advises AOL Instant Messenger users not to switch to the new version of the software because it “introduces important …

The antivirus industry and the grayware problem

Grayware is a general term used often used for spyware, adware, remote access tools, dialers and other applications that cannot be defined strictly as malware, but do affect …

Don't miss

Cybersecurity news