Week in review: New ZeuS version and multi-stage attacks cyber attacks
Here’s an overview of some of last week’s most interesting news and articles: When identity theft is not your fault It is definitely true that you should be …
Bank of America phishing scam
Phishing emails purportedly coming from Bank of America are nothing new – every now and then scammers roll out a slight variation on the previous one, and this latest is …
Eurephia: Authentication plug-in for OpenVPN
Eurephia is an authentication plug-in for OpenVPN. OpenVPN is a simple but yet powerful application to create secure VPN connections between computers and networks. OpenVPN …
New line of unmanaged networking switches
V7 unveiled a new line of affordable, high-performance networking switches ideal for small or growing networks requiring reliable and affordable performance. V7 8-Port and …
Facebook: The Missing Manual
Facebook’s popularity is skyrocketing, drawing 500 million people to this combination online village green, personal website creator, and souped-up address book. But one …
First advanced virtualization certifications
Virtualization skills are in high demand among IT employers, as companies direct IT budgets to widespread deployment of virtual servers and virtual desktops. Recent studies …
Drive backup for PGP Whole Disk Encryption
Future Systems Solutions announced Casper Secure Drive Backup 2.0 for PGP Whole Disk Encryption, a major update to the only PC backup solution to confront the problems …
Many kids have a negative online experience
Kids around the globe are growing up in an online world, learning to navigate not just the Web, but new rules, emotions and unfortunately, some negative experiences. The …
iSSH: iPhone and iPad SSH client
iSSH is a comprehensive VT100, VT102, VT220, ANSI, xterm, and xterm-color terminal emulator over SSH and telnet, integrated with a tunneled X server and VNC client. iSSH is …
Last chance to get £225 off your RSA Conference Europe registration
RSA Conference Europe 2010 uncovers new threats emerging and how you can contain them. Over three days get the practical knowledge to protect your organization. Choose from …
Hackers: Heroes of the Computer Revolution
This 25th anniversary edition of Steven Levy’s classic book traces the exploits of the computer revolution’s original hackers—those brilliant and eccentric nerds …
The top benefits of virtualization
According to a CDW-G report, 77 percent of agencies are implementing at least one form of virtualization, and of those, 89 percent are benefiting from the technology. Benefits …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains