Planning for IPv6
With IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level …
Trojan rounds up and steals Word and Excel docs
Beware of bogus FedEx emails asking you to review a shipment notification – the attached Fedex_Invoice.exe is actually a downloader Trojan that opens you computer to …
Hungarian sentenced for hacking, blackmailing Marriot
Attila Nemeth, a 26-year-old Hungarian national who tried to blackmail Marriot International into giving him a job by stealing the company’s internal documents and …
Update on the Kelihos botnet
Reports that the Kelihos botnet is back online and that its original operators are again trying to take over its reigns have been premature, says Microsoft. “Contrary to …
The state of cyberwar in the U.S.
As a country that is used to being dominant in the more traditional sense, the U.S. has been working to come to grips with a new sense of supremacy as a result of cyber …
Quick response, quick risk?
You don’t have to look far these days to spot a QR code. From their humble beginnings in labeling and tracking parts used in vehicle manufacturing, these blocky little …
Simple steps to ensure online safety
Resent research into internet use by teenagers conducted for GFI Software revealed that one in three parents do not know if Internet safety tips are being taught to their …
Smaller DDoS attacks can be deadlier than big ones
Contrary to conventional thinking that large bandwidth cyber attacks wreak the most damage on enterprises, security experts at Radware instead found that bigger problems …
Windows privilege management with enterprise reporting capabilities
Avecto has unveiled the latest version of its Privilege Guard technology, developed to enable organizations to give all users the privileges they need to remain productive …
CRISC certification: Reacting to a radically changing IT landscape
The number of IT professionals seeking the CRISC (Certified in Risk and Information Systems Control) certification continues to rise rapidly. More than 16,000 professionals …
Viral Facebook spam campaign delivers malware
If you spot a Facebook friend of yours worrying about and linking to news about the US attacking Iran and Saudi Arabia, curb your curiosity and don’t follow the link if …
Compromised DreamHost-hosted websites lead to scams
Hundreds of websites hosted by DreamHost have been compromised and are used to redirect users to a Russian scam page, warns Zscaler. Whether or not this is the result of the …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance