Many organizations are slowly phasing out the traditional and clunky IPSec VPN for newer SSL VPNs. Here's the pros and cons.
Self destruct sequence initiated.
Hackers have implemented a sophisticated malware variant to siphon large amounts of money from businesses conducting online transactions.
A somewhat good idea receives a terrible execution.
A cloud-based server means a hacker can get to it from any location.
If you lie on the Internet, expect to be called out quickly.
A hacker by the name of "Reckz0r" has claimed responsibility for breaching over 70 banks and releasing account details of over 1,700 customers online.
Microsoft released Forefront Identity Manager 2010 R2 today.
Intune 3.0 is now available for download.
Four of the seven bulletins address RCE flaws.
Hackers could access your database in seconds.
Microsoft released its June patch today, which includes three "critical" security items and four "important" bulletins.
The flaw, reported this week, could allow an incorrect password to be verified as correct due to an error in the token calculation, according to Sergei Golubchik, security coordinator for MariaDB, in a posted statement.
Beyond the flexibility and costs savings of cloud computing are certain tactical advantages like automated provisioning and encrypted storage. This quick primer by cloud security expert Vic Winkler will give you the pros and cons of each.
Microsoft's monthly security update will be arriving this Tuesday.
Hackers recently raided the LinkedIn and eHarmony Web sites and published user password information, software security researchers said this week.
Stuxnet was reportedly created by the U.S. and Israel.
Unauthentic certificates are to blame.
And your eHarmony password accounts, while you're at it.
Microsoft issued a security advisory this week about the Flame virus, which is using unauthentic certificates from the company to trick antivirus programs.