Microsoft confirms unpatched Windows vulnerability

Microsoft confirms unpatched Windows vulnerability


Microsoft confirms unpatched Windows vulnerability

Posted: 04 Jan 2011 01:04 PM PST

Microsoft released a new security advisory to address a publicly disclosed vulnerability affecting Microsoft Windows' Graphics Rendering Engine on Windows Vista, Server 2003 and Windows XP. An atta...

The evolution of cyber criminal operations

Posted: 04 Jan 2011 10:46 AM PST

There is a concerning evolutionary step cyber criminal operations are taking to more effectively diversify the distribution of their ill-gotten gains, according to Fortinet. "In December 2010 we sa...

Is Google losing its fight against spam?

Posted: 04 Jan 2011 09:55 AM PST

Once upon a time, Google was unequivocally the best and the most popular search engine in the world. Ranking pages by how they were interconnected (linked) to other sites, Google was the successfu...

A closer look at avast! Free Antivirus

Posted: 04 Jan 2011 08:25 AM PST

Avast! Free Antivirus (v.5.1.864) is an anti-virus, anti-spyware software with boot-time scanning capabilities. It also incorporates anti-rootkit and strong self-protection capabilities, and contains ...

Most federal employees take IT security seriously

Posted: 04 Jan 2011 06:25 AM PST

Most Federal employees go beyond baseline IT security requirements, according to a new survey by the Government Business Council. While 97 percent of Federal employees are required by their agencie...

Dell to acquire SecureWorks

Posted: 04 Jan 2011 06:15 AM PST

Dell has signed a definitive agreement to acquire SecureWorks, a provider of information security services. SecureWorks protects information assets, improves compliance and reduces costs for organizat...

Secure your iMac with a lock

Posted: 04 Jan 2011 06:02 AM PST

MacLocks is making iMac theft prevention possible, following up their successful iPad lock. The all new Maximum Security iMac lock makes it easier than ever to lock down an iMac:Installs in minut...

Mobile users more vulnerable to phishing attacks

Posted: 04 Jan 2011 05:31 AM PST

Trusteer recently gained access to the log files of several web servers that were hosting phishing websites. Analyzing these log files provided visibility into how many users accessed the websites, wh...

0 comments:

Post a Comment