Privilege Guard 3.6 released
Avecto released Privilege Guard 3.6, which introduces a number of new features, including a challenge/response capability to easily authorize applications for remote users and …
Effective MySQL: Replication Techniques in Depth
Effective MySQL: Replication Techniques in Depth describes what is needed to understand and implement MySQL replication to build scalable solutions. This book includes …
Week in review: Windows 8 security features, weak crypto allowed spoofing emails from Google, PayPal domains
Here’s an overview of some of last week’s most interesting news and articles: Shortened .gov URLs lead to scams The fact that cyber crooks often misuse URL …
Flaw in boarding pass check system puts fliers in danger
Everybody knows by now that airline boarding passes have barcodes that, when decoded, show a series of letters and numbers that “summarize” the main information …
Software backdoor makes critical infrastructure vulnerable to attacks
Ever since Stuxnet managed to disrupt the workings of the Natanz nuclear facility, the security of industrial control systems (ICS) has deservedly received a lot of attention. …
First look at Windows 8 security features
Windows 8 launched this week. It brings a new interface, but under the hood, it introduces a number of new security features. The most significant change in terms of security …
Best practices from healthcare and compliance experts
Data breaches in healthcare are raising alarm. Nearly 20 million patient health records have been compromised in the past two years, according to the U.S. Department of Health …
Why mobile malware is big in China and Russia
According to Lookout’s State of Mobile Security Report 2012, “Toll Fraud” malware has become the most prevalent type of malware within the past year due to …
Windows 8 launch prompts thoughts on life after XP
Much has been made of the extensive changes that Microsoft has revealed around the aesthetics and performance of Windows 8, as well as the possible effects these changes will …
Delta-themed spam run delivers deficient malware
Delta Airlines customers are targeted in the latest malicious spam campaign to hit email inboxes: The email claims that the ticked for the flight booked by the recipient is …
The anatomy of cyber security exercises
In its new report, the EU’s ‘cyber-security agency’ ENISA (the European Network and Information Security Agency) examines 85 national and international …
Real user monitoring for web developers
AppNeta announced Real User Monitoring (RUM) capabilities designed for web development and application performance. As a key feature of AppNeta’s TraceView application …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)