qwerty_logo_header_2024
Free Assessment
Windows Threshold Videos Leak

Videos offer a peek at Microsoft's Windows Threshold in action, including Start menu features that could appease keyboard-and-mouse fans who hate Windows 8. Earlier this week, alleged screenshots of the next version of Windows, codenamed Threshold, leaked online. The images provided the first in-depth look at Microsoft's upcoming OS, including support for virtual desktops, the […]

IT Executives Worried About Employees Using Chat Apps

Nearly 70 percent of companies are concerned about employees using third-party messaging and chat apps to communicate and send documents internally, according to a survey of 397 IT enterprise decision-makers by messaging and mobility specialist Infinite Convergence. The study also found that 59 percent of IT decision-makers think third-party messaging apps and chat tools are […]

Employees Slow to Report Stolen Mobile Devices

As the rate of stolen mobile devices has increased, the average time for IT departments to respond to this security threat has also grown, according to a Kaspersky Lab survey of global IT security professionals. The report found that more than one-third of employees (38 percent) take up to two days to notify their employers […]

Attackers Compromise Vulnerable Web Servers to Power DDoS Assaults

Web servers based on both Linux and Windows are rapidly being targeted by attackers and turned into server-side botnets capable of high-bandwidth denial-of-service attacks, two security firms stated in recently published analyses. On one hand, attackers are targeting unpatched or poorly-maintained Linux systems, exploiting known vulnerabilities and installing bot software to conscript the computers into […]

HP Demonstrates Why Everybody Needs to Think Like the 'Bad Guys'

Angela Gunn, an old friend who is working as a security researcher these days  was explaining some of the problems with traditional approaches to thinking about security. But she is focused on Hewlett-Packard's latest push, which is to think like a bad guy trying to break into computer networks and databases. We were both attending […]

Who Owns EHR Data?

The owners of electronic health records aren't necessarily the patients. How much control should patients have? Electronic medical records contain highly personal information, from illnesses to family matters to emotional statuses. Yet those records don't necessarily belong to the patient. The question this raises in the digital age is: Just how much control should people […]

Microsoft Patches 37 IE Security Vulnerabilities in September Update

The seemingly endless stream of Internet Explorer security flaws continues. Is there an end in sight? Microsoft today released its September Patch Tuesday update, with Internet Explorer topping the list of vulnerabilities. This month, Microsoft is patching 37 vulnerabilities in IE, of which 36 were reported privately and one was publicly disclosed. Ross Barrett, senior […]

CEOs Look to IT Leaders for Future Success, Growth

Almost all CEOs and business owners believe their company’s IT department with play a critical role in their business in 2015, a Modis survey found. Almost all CEOs and business owners believe their company’s IT department with play a critical role in their business in 2015, a Modis survey found. - See more at: http://www.eweek.com/small-business/ceos-look-to-it-leaders-for-future-success-growth.html#sthash.LXvJ4W1F.dpuf […]

Navigating New Internet Domains

New Internet domain extensions keep increasing. Registering for one is pricey, but most businesses can't afford not to. For a long time, only 22 generic top level domains (gTLDs), such as .com, .org, and .edu, were available for businesses looking to set up shop online. But since opening up applications for new gTLDs in 2011, […]

Attack hijacks DNS settings on home routers in Brazil

An ongoing attack in Brazil tricks users into visiting malicious websites that attempt to silently change the Domain Name System settings of their home routers. If the attack is successful, the routers are reconfigured to use rogue DNS servers that redirect victims to phishing pages when they open banking sites, said Fabio Assolini, a security […]

1 10 11 12 13 14 18
Copyright © 2024 QWERTY Concepts, Inc.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram