Expert analysis
How to marry security and systems management
New security threats emerge every day. From large-scale virus and worm outbreaks through to phishing and social engineering attacks, the growth of malware is forcing …
Anti Web bug privacy option in the new iPhone 3.0 Mail.app
According to Wikipedia, a Web bug is an object that is embedded in a web page or e-mail and is usually invisible to the user but allows checking that a user has viewed the …
Q&A: Backup challenges
Stephen Aldous is a technical specialist on all of Iron Mountain Digital’s solutions providing prospects and customers with in-depth consulting and technical knowledge. …
A closer look at Avast Home Edition 4.8
Avast Home Edition is an antivirus, anti-spyware and anti-rootkit package. Daily automatic updates ensure continuous data protection. The software is offered in over 30 …
Everything enterprises need to know about end-to-end encryption
Here’s a sobering statistic: according to the 2009 Verizon Data Breach report, 285 million records were compromised in the 90 cases that Verizon investigated in 2008. …
A closer look at AntiLogger 1.9.2.104
Zemana AntiLogger protects your PC from keyloggers, SSL banker trojans, spyware – it detects when malware runs on your computer, and it shuts it down before it can steal …
The SMB security standpoint
In this edition of the HNS podcast, David Kelleher, communications and research analyst at GFI Software discusses the SMB standpoint towards security, what are they doing and …
Best practices for keeping your data center secure
Virtualization has been one of the biggest trends to hit the data center over the past few years, and the rush to consolidate servers to save on power and cooling has seen …
A closer look at Recover PDF Password for Mac
Recover PDF Password is a Mac tool that recovers forgotten passwords to PDF documents. If the PDF is password-protected, Recover PDF Password will retrieve both …
WordPress two-factor authentication with low-cost YubiKey USB token
WordPress is a versatile platform used by a large number of bloggers worldwide. This article will show you how to power up your WordPress installation with a low cost …
The security and privacy paradox: Getting it right
Privacy is considered a human right in Europe and to this extent organizations have focused on protecting the privacy of their customers’ data. However, there’s a …
Web application security myths
In the latest episode of the HNS Podcast, Mandeep Khera from Cenzic shares his views on various myths in the field of web application security. To listen to the podcast, click …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity