The so-called "in-session phishing" attack prompts the victim to retype his username and password for the banking site because the online banking session "has expired," for instance, via a popup that purports to be from the victim's bank site, according to researchers at Trusteer Read More
1. How are versions of virtual-machine snapshots of images tracked? The 'snapshots' of images (including virtual-machine guest-operating-system states) must be tracked in terms of where they sit on the network, how they are being used and their appropriate fix and patch status. A popular use of virtual-machine technology is wrapping guest operat Read More
Here's a new way to get Microsoft to pay attention to you: Slip a brief message into the malicious Trojan horse program you just wrote. That's what an unnamed Russian hacker did recently with a variation of Win32/Zlob, a Trojan program victims are being tricked into installing on their computers. Read More
Shopping for essentials can be tiresome for many. First you need to move around such a vast place searching for your stuff and then standing in long queues to pay the bills. Wouldn't you want your shopping to be a hassle free experience where you enter into the supermarket, pick up things you need and walk out without having to stand in queues fo Read More
Information security company SafeNet has developed a data protection encryption and key management security service for retailers still struggling to comply with the Payment Card Industry's Data Security Standard. Read More
McAfee warns that lots of fake Google Code projects have been created by cyber-criminals in order to push malware to unsuspecting users. The projects promote adult videos that prompt users to download malware in the form of fake video codecs. Read More
I expect that the current recession will last through all of 2009 and will accelerate the adoption of virtualization technology. Up until now, virtualization--especially x86 server virtualization--has been pushed forward by the huge hardware and operational savings accrued from app server consolidation. Sadly, the consolidation of whole businesses Read More
Everyone knows there is no silver bullet for security. And like all organizations, government agencies have to contend with increasingly complex, potentially damaging and a surprisingly sophisticated new class of security threats. Learn what five steps you can take now to feel confident that you are being proactive and preparing your organization Read More
Complinet's 5th Compliance Awards ceremony will take place at Park Lane's prestigious Grosvenor House, January 22, 2009. Read More
A lot of budget-strapped CIOs are going to be telling their systems and storage directors to take another look at consolidation this year. These days, consolidation means virtualization. Only recently, that mainly meant VMware ESX. That is still the weapon of choice for many reasons, but suddenly Microsoft actually has a competitive product. After Read More
Subscribe

Share your small business tips with the community!
Share your small business tips with the community!
Share your small business tips with the community!
Share your small business tips with the community!