- Akamai admits its OpenSSL patch was faulty, reissues keys
- Google updates terms of service to reflect its scanning of users' emails
- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
Microsoft has toughened its criteria for classifying programs as adware and gave developers three months to conform with the new principles or risk having their programs blocked by the company's security products.
By Lucian Constantin | 05 April, 2014 00:17
Home routers and other consumer embedded devices are plagued by basic vulnerabilities and can't be easily secured by non-technical users, which means they'll likely continue to be targeted in what has already become an increasing trend of mass attacks.
By Lucian Constantin | 04 April, 2014 01:48
A new variant of the Gameover computer Trojan is targeting job seekers and recruiters by attempting to steal log-in credentials for Monster.com and CareerBuilder.com accounts.
By Lucian Constantin | 26 March, 2014 15:05
A new variant of a malicious program called BitCrypt that encrypts files and asks victims for bitcoin payments is being distributed by a computer Trojan that first pilfers bitcoin wallets.
By Lucian Constantin | 25 March, 2014 15:03
Whitepapers about spyware
In 2010, the threat posed by the web is sharper and more extensive than ever before. Almost any website can now host malware, or forward you to one that does. Indeed, an infection is much more likely to result from a visit to a perfectly legitimate website that has been compromised with a virus or spyware – than from one set up specifically to spread malware. Read More.
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTMicrosoft Business Intelligence ConsultantNSW
- FTIT Support EngineerNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTExecutive Producer/Head of Production: Advertising AgencyNSW
- FTOBIEE BI/DW ConsultantNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTDeliverability SpecialistNSW
Due to a lack of consumer confidence and a subsequent drop in sales, all entities that handle credit cardholder information are being challenged to adopt more effective data protection measures. This paper provides information on available tools to help validate compliance with the latest version of the Payment Card Industry Data Security Standard (PCI DSS).
- Lycamobile issued warning for over-charging customers
- TPG should pay rural levy for each FTTB service: NBN Co
- Ukraine tensions could hurt international security efforts, Kaspersky says
- See ya, Microsoft: Intel looks to Android for growth in tablets
- Rushed Heartbleed fixes may expose users to new attacks
- NBN Co hits 105Mbps in limited FTTN trial
- Typo halts sales of iPhone keyboard as injunction takes effect
- In Pictures: Windows 8.1 tablets with 8-inch screens: Which one is right for you?
- Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab
- Big data drives 47% growth for top 50 public cloud companies
- Cellular industry makes concession on kill switch
- In Pictures: Inside evolving satellite technology
- Intel sells more tablet chips but profits fall
- Red Hat adds muscle to Docker container technology
- USB 3.0 jumps to light speed with new 10-meter optical cable