WD unveils thinnest 2.5-inch hybrid hard drive
WD announced it is sampling a 5mm-thin hard disk drive featuring hybrid technology. WD has developed hard drives slim enough for integration into today’s thinnest …
Windows Server 2012 Pocket Consultant
Portable and precise, this pocket-sized guide delivers ready answers for the day-to-day administration of Windows Server 2012. Zero in on core operations and daily tasks using …
Microsoft releases two security bulletins
The Microsoft Security Bulletin Summary for September 2012 includes just two bulletins, both of which address vulnerabilities rated “important.” The first, …
Pirate Bay’s co-founder deported to Sweden, Anonymous hacks Cambodian ministry
Pirate Bay co-founder Gottfrid Svartholm has been deported from Cambodia and has landed at Stockholm’s airport this morning, reports TorrentFreak. The formal reason …
39% of IT staff can get unauthorized access to sensitive information
IT professionals are allowed to roam around corporate networks unchecked, according to a survey of more than 450 IT professionals by Lieberman Software. It found that 39% of …
Oracle confirms existence of another critical Java flaw
When Oracle finally patched the CVE-2012-4681 Java 0-day that was being actively exploited in the wild, Polish firm Security Explorations immediately piped up to say they …
Jump in mobile app and banking scams
In August, GFI threat researchers identified a number of high-profile fake mobile application scams, along with a spike in email scams targeting UK banking and government …
Bogus GTA Vice City Android game leads to SMS Trojan
Offering bogus packs of popular games have always been a well-liked approach of malware peddlers around the world. GFI has recently spotted a fictitious Vice City version of …
Millions of GoDaddy sites go offline due to alleged DDoS attack
GoDaddy, on of the biggest and most popular Internet domain registrars and web hosting companies in the world, has suffered an outage on Monday that left many of its …
HP introduces intelligent security solutions
HP announced additions to its security solutions portfolio that enable enterprises to assess, transform, optimize and manage their security environments. Cloud, mobility and …
Social networking protection from Trend Micro
Trend Micro released Trend Micro Titanium Internet Security 2013, a new family of security software that promises to consumers “Protection Made Easy” combining …
PostgreSQL 9.2 improves performance and scalability
With the addition of linear scalability to 64 cores, index-only scans and reductions in CPU power consumption, PostgreSQL 9.2 has improved scalability and developer …
Featured news
Resources
Don't miss
- What makes a security program mature and how to get there faster
- EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations
- Win-DDoS: Attackers can turn public domain controllers into DDoS agents
- How Brandolini’s law informs our everyday infosec reality
- From legacy to SaaS: Why complexity is the enemy of enterprise security