Windows Server 2012: Up and Running
If your organization plans to move to a cloud infrastructure from a LAN or WAN, this book shows you how to do it efficiently with Windows Server 2012. Experienced Windows …
Week in review: 0-day SCADA flaws for sale, FreeBSD infrastructure breached, and the right to be forgotten
Here’s an overview of some of last week’s most interesting news and videos: FreeBSD infrastructure breached, third-party packages potentially affected The FreeBSD …
Digitally signed ransomware lurking in the wild
Trend Micro researchers have spotted two ransomware variants bearing the same (probably stolen) digital signature in order to fool users into running the files. Other than …
Bogus Apple invoice leads to Blackhole, banking malware
If you receive an invoice seemingly coming from Apple that apparently shows that your credit card has been billed for $699,99 (or a similar preposterously huge amount of …
“Twitter is going to start charging” phishing scheme pops up
Twitter users are being actively targeted with DMs falsely announcing Twitter’s decision to start charging its use, warns the pair behind the @TweerSmarter account. …
HP delivers server for Big Data
HP unveiled a server built to help clients operationalize Big Data, drive new business opportunities and save up to $1 million over three years. With the advent of Big Data …
Fake Tesco free Christmas voucher offer leads to phishing
Emails purportedly coming from British retailer Tesco offering free Christmas shopping vouchers have been hitting inboxes around the world, warns Hoax-Slayer. The link that …
ManageEngine updates Password Manager Pro
ManageEngine announced enhancements to Password Manager Pro, which offers protection to data centres by helping establish access controls to IT infrastructure, and seamlessly …
Windows 8 Inside Out
You’re beyond the basics—so dive right into Windows 8 and really put your PC to work! Windows 8 Inside Out is an organized reference packed with hundreds of timesaving …
Facebook wants to eliminate user voting on privacy changes
Facebook has announced some proposed updates to their Data Use Policy (how user data is collected and used) and their Statement of Rights and Responsibilities (explains the …
Trojanized Thanksgiving-themed screensavers lurking online
If you want to add a little festive cheer to your computer, a screensaver showing beautiful Thanksgiving images might be just the thing. But unfortunately, not all things …
Understanding basic honeypot concepts
The EU cyber security Agency ENISA is launching an in-depth study on 30 different digital traps or honeypots that can be used by CERTs to proactively detect cyber attacks. The …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)