Due in large part to the Midwestern predilection for financial modesty, the Madoff scandal reverberated through the closely knit Jewish community of Minneapolis' western suburbs. Read More
By understanding the growing number of threats to their networks and what countermeasures to take to minimize security risks, mobile operators can protect their customers and their networks against many of the attacks that inevitably will take place. This white paper describes the most common attacks on mobile networks and what to do about them. Read More
A steady stream of upgrades to leading desktop virtualization releases are taking aim at some of the crucial shortcomings in the technology in the hopes that financially strapped enterprises will start to view VDI as a necessity rather than a luxury. Read More
The worm that has infected several million Windows PCs is causing havoc because nearly a third of all systems remain unpatched 80 days after Microsoft rolled out an emergency fix, a security expert said Thursday. Read More
Sun Microsystems' xVM VirtualBox desktop virtualization software is an increasingly powerful, no-cost alternative to VMware Workstation and Parallels Desktop products and should be added to the consideration shortlist of software developers and IT managers. Any IT professional who wants to get more familiar with virtualization technology that goes Read More
Google's free code-hosting Web site for developers is being used to distribute malware, a security researcher said on Friday. Google Code is a place where programmers can host projects and code. Along with the legitimate code are links to fake videos that direct users to download a missing codec, said Dave Marcus, director of security research fo Read More
In Greek mythology, Hermes acted as a messenger, relaying information between humans and the gods, while also protecting boundaries. That makes him an apt namesake for the Health Research Management and Evaluation System, or HERMES—a preventative health-care system developed at the University of South Florida that has already been tested at one as Read More
Hacking has become a big problem concerning Internet security, one that even affects the government and other high security computer networks. Hacking attacks can range from mildly annoying or just disruptive, or they can threaten finances and even the security of people and the country. Read More
Companies are increasingly adopting Voice over IP (VoIP) for their corporate telephony infrastructure. With VoIP telephony replacing traditional public switched telephone network (PSTN) telephony services, companies have concerns around the security of VoIP services. Users tend to trust the PSTN since it is more infrastructure based and the infras Read More
The so-called "in-session phishing" attack prompts the victim to retype his username and password for the banking site because the online banking session "has expired," for instance, via a popup that purports to be from the victim's bank site, according to researchers at Trusteer Read More
Subscribe

Share your small business tips with the community!
Share your small business tips with the community!
Share your small business tips with the community!
Share your small business tips with the community!