Please turn on your JavaScript for this page to function normally.
How to marry security and systems management

New security threats emerge every day. From large-scale virus and worm outbreaks through to phishing and social engineering attacks, the growth of malware is forcing …

Anti Web bug privacy option in the new iPhone 3.0 Mail.app

According to Wikipedia, a Web bug is an object that is embedded in a web page or e-mail and is usually invisible to the user but allows checking that a user has viewed the …

Q&A: Backup challenges

Stephen Aldous is a technical specialist on all of Iron Mountain Digital’s solutions providing prospects and customers with in-depth consulting and technical knowledge. …

A closer look at Avast Home Edition 4.8

Avast Home Edition is an antivirus, anti-spyware and anti-rootkit package. Daily automatic updates ensure continuous data protection. The software is offered in over 30 …

Everything enterprises need to know about end-to-end encryption

Here’s a sobering statistic: according to the 2009 Verizon Data Breach report, 285 million records were compromised in the 90 cases that Verizon investigated in 2008. …

A closer look at AntiLogger 1.9.2.104

Zemana AntiLogger protects your PC from keyloggers, SSL banker trojans, spyware – it detects when malware runs on your computer, and it shuts it down before it can steal …

The SMB security standpoint

In this edition of the HNS podcast, David Kelleher, communications and research analyst at GFI Software discusses the SMB standpoint towards security, what are they doing and …

Best practices for keeping your data center secure

Virtualization has been one of the biggest trends to hit the data center over the past few years, and the rush to consolidate servers to save on power and cooling has seen …

A closer look at Recover PDF Password for Mac

Recover PDF Password is a Mac tool that recovers forgotten passwords to PDF documents. If the PDF is password-protected, Recover PDF Password will retrieve both …

WordPress two-factor authentication with low-cost YubiKey USB token

WordPress is a versatile platform used by a large number of bloggers worldwide. This article will show you how to power up your WordPress installation with a low cost …

The security and privacy paradox: Getting it right

Privacy is considered a human right in Europe and to this extent organizations have focused on protecting the privacy of their customers’ data. However, there’s a …

Web application security myths

In the latest episode of the HNS Podcast, Mandeep Khera from Cenzic shares his views on various myths in the field of web application security. To listen to the podcast, click …

Don't miss

Cybersecurity news