Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

BonkersWorld: Best Social Network Ever

via the genius of Manu Cornet at BonkersWorld.

View Article


Image may be NSFW.
Clik here to view.

What Six Sigma Has to Say About Reducing Failures

I spent most of my career at General Electric (GE), and was fortunate to grow my career when Jack Welch required aspiring managers to get a Six Sigma certification. This wasn’t always popular in IT,...

View Article


Image may be NSFW.
Clik here to view.

Decoding Service for Audio-Skimmed Credit Card Data Offered in the Underground

A new service recently launched in the underground, offering cybercriminals to decode track 2 data (raw information of the magnetic stripe) that was captured in audio format by ATM skimmers. ATM...

View Article

Image may be NSFW.
Clik here to view.

A Simple Lesson in Protecting yourself against Malware

We see the stories in the news each and everyday. Malware hit Android. Malware took advantage of known flaws in Windows. Source code was released for a new family of malware. The thing is … none of...

View Article

Image may be NSFW.
Clik here to view.

“avast!, you little minx…”

Early Monday morning in the quiet AVAST Software headquarters office in Prague, we walked bleary-eyed to the coffee machine for our morning jolt. To our surprise, the peacefulness of the morning was...

View Article


Image may be NSFW.
Clik here to view.

Sprint 4G LTE Now Available in 15 Areas .  Today’s #HPIO  Mobility Matters...

Sprint 4G LTE Now Available in 15 Areas. Today's #HPIO  Mobility Matters for +Esther Schindler... $SSprint 4G LTE Now Available in 15 Areas - Input Output

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Webcast Replay: view our recent webcast, “Large Scale Cloud Forensics”.http://bit.ly/xOGmy0

View Article

Image may be NSFW.
Clik here to view.

Cyber Espionage: The Chinese Threat (Full Episode) CNBC

Cyber Espionage: The Chinese Threat (Full Episode) CNBC

View Article


Image may be NSFW.
Clik here to view.

There is a Roadmap to the Internet, and Having the Right One Counts!

The tale of DNSCHANGER ( 2+ yrs. in the making) has come to an end, criminal malware re-routing browser traffic in a profitable clickthru scam had its last vestiges die on July 9th. International law...

View Article


Image may be NSFW.
Clik here to view.

Online dating scam campaign currently circulating in the wild

By Dancho Danchev Lonely birds, beware! Russian online dating scammers are currently spamvertising a fraudulent campaign attempting to socially engineer users into interacting with a bogus online...

View Article

Image may be NSFW.
Clik here to view.

New Yahoo app vulnerability explains Android spam

After a Microsoft engineer claimed he discovered an Android botnet sending out spam from Yahoo accounts on an international scale, Google denied the allegations. Now a newly discovered vulnerability in...

View Article

Image may be NSFW.
Clik here to view.

Which browser is safest? The browser wars are back and this time you win

The upcoming releases of Internet Explorer 10, Firefox 14 and Chrome 21 are all fighting for our attention and using security as the reason why.

View Article

Image may be NSFW.
Clik here to view.

Is the Law Unwittingly Creating a New Generation of Security Experts? #HPIO...

Is the Law Unwittingly Creating a New Generation of Security Experts? #HPIO UK for +HPUK by +Fernando Fonseca...Is the Law Unwittingly Creating a New Generation o... - Input Output

View Article


Image may be NSFW.
Clik here to view.

Tenable Network Security Podcast Episode 133 – "Detecting Mobile Device...

Welcome to the Tenable Network Security Podcast Episode 133 Announcements We're hiring! - Visit the Tenable website for more information about open positions. Check out our video channel on YouTube...

View Article

Image may be NSFW.
Clik here to view.

Detecting Mobile Device Vulnerabilities Using Nessus

The Mobile Device Threat Without question the security of mobile devices is on the minds of almost every IT department. The average mobile worker carries 3.5 mobile devices at all times, a number that...

View Article


Image may be NSFW.
Clik here to view.

Lessons Learned from Humpty Dumpty

As the parent of a one-year old, I have found myself very well acquainted with nursery rhymes. From Sesame Street to the myriad of toys that my child owns, nursery rhymes are everywhere in my world....

View Article

Image may be NSFW.
Clik here to view.

How can I make sure my VPN is encrypted and working properly?

*Editor’s Note: These columns originally appeared in TechTarget’s SearchEnterpriseWan.com By Rainer Enders, CTO of Americas for NCP engineering The simplest way to do this is to act like a hacker....

View Article


Image may be NSFW.
Clik here to view.

Webroot Bulletin Regarding AV-Comparatives Results

By Grayson Milbourne and Joe Jaroch If there is one thing that can be observed about the AV industry, it is that no solution is ever 100% effective at blocking malware. With this in mind, Webroot...

View Article

Image may be NSFW.
Clik here to view.

Symantec Announces Mobile Security And Management Product Portfolio

Updates to enable secure mobile email deployments, mobile application initiatives, and Bring Your Own Device programs

View Article

Image may be NSFW.
Clik here to view.

F5 Networks Announces Results For Third Quarter Of Fiscal 2012

Revenue up quarter-over-quarter and year-over-year

View Article
Browsing all 37364 articles
Browse latest View live