What will the workplace of the future look like?
IT consumerization is dependent on an open-minded approach by organizations, and most likely to succeed with specific, pre-defined parameters, according to Dell and Intel. …
Location tracking becomes more attractive
In a GFI Software survey of more than 1,000 U.S. respondents, 12% say they would use location tracking to monitor their spouse’s whereabouts, while 31% of respondents …
CryptoAuditor: Privileged user access auditing
SSH Communications Security launched CryptoAuditor at the Black Hat USA 2012 conference. It helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with …
Novell makes BYOD enterprise ready
Novell announced the availability of ZENworks Mobile Management, which addresses the pain points device administrators and managers face today, including BYOD (bring your own …
Safe C++: How to avoid common mistakes
It’s easy to make lots of programming mistakes in C++. In fact, any program over a few hundred lines is likely to contain bugs. With this book, you’ll learn about …
Apple releases OS X Mountain Lion
Apple announced that OS X Mountain Lion, the ninth major release of its desktop operating system, is available as a download from the Mac App Store, available as an upgrade …
VirusTotal starts sandbox-testing, shares behavioral information
Developer Emiliano Martinez has recently confirmed what many users of VirusTotal have already noticed: that the online file scanning service has added behavioral information …
Scientists develop tool for improving app security
A team led by Harvard computer scientists, including two undergraduate students, has developed a new tool that could lead to increased security and enhanced performance for …
New Mac backdoor Trojan spotted
A new Mac Trojan – dubbed Crisis or Morcut – has been spotted but, luckily, not in the wild. Security firms Intego and Sophos have picked up samples from Virus …
Sharp rise in SQL injections
FireHost revealed the latest statistical analysis of attacks successfully blocked by its servers. During the period of April to June 2012, web applications, databases and …
Microsoft Security Toolkit delivers new defensive technology
Microsoft’s Trustworthy Computing Group today released the Enhanced Mitigation Experience Toolkit (EMET) 3.5 Technology Preview, which includes new Return Oriented …
Android malware no longer just posing as Opera Mini
Malicious Android apps posing as the mobile Opera Mini browser or an update for it are nothing new, and they are usually malware that sends text messages to premium-rate …