- Blackhole Exploit Kit creator 'Paunch' in custody, Russian police confirm
- Regional privacy authorities may use data-sharing 'white lists' to boost enforcement
- The week in security: Microsoft fights NSA as shadow IT bites business
- Information Commissioner received no eHealth privacy complaints in 2012-13
- US tech companies ask governments to reform surveillance practices
- US faces major Internet image problem, former gov't official says
- On snooping disclosures, AT&T and Internet companies are like night and day
- TPG buys AAPT
- Telstra hits 300 Mbps in LTE-A trial
- Moto G real-world review: The best budget phone money can buy
trend micro in pictures
Malicious software aimed at stealing online banking credentials surged in the third quarter of this year to a level not seen since 2002, according to a new report from Trend Micro.
Cisco Systems released software security updates Wednesday to address denial-of-service and arbitrary command execution vulnerabilities in several products, including a known flaw in the Apache Struts development framework used by some of them.
A new version of the Apache Struts development framework released Friday fixes two problems that had developers worried.
VMware's NSX network virtualization platform, expected out by year end, will have a key security tool for deploying security software and services to VMware-based virtual machines.
Chinese hackers are using an automated tool to exploit known vulnerabilities in Apache Struts, in order to install backdoors on servers hosting applications developed with the framework.
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
One can only hope that security software provider Trend Micro saw a nice sales boost after the proclamation of its chairman earlier this week that Android phones are more vulnerable to hacking than iPhones are. If it didn't, those blatantly self-serving statements were made for nothing.
It's become an all-too-common scam: A legitimate Web site pops up a window that looks just like a real security warning. It says there's something wrong with the computer, and click here to fix it. A few clicks later, the victim is paying out US$40 for some bogus software, called rogue antivirus.
Looking for guidance on how to properly conduct tests prior to launching any email campaign? This whitepaper discusses important areas for campaign managers to test; the best approaches to managing the testing process, seven key pitfalls to avoid, and specific testing best practice for marketers. The sooner you define and implement your testing program, the sooner you will be positioned to send meaningful communications to your customers through the channels they prefer. The more you test, the more you learn and the more you sell.
Note: This review covers version 8.5 of the software. This software is now in version 9.0. Antivirus program AVG 8.5 Free offers solid features and ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Apple knows where shoppers are in its stores with nationwide iBeacon rollout
- Should Facebook, Yahoo and Twitter really judge what's news?
- Distracted consumers spend less time on social than email marketing: Report
- New report busts myths about millennials and their digital and social behaviour
- Twitter gobbles up more cookies with retargeted ads, says users have privacy choices