Facebook has its advantages, but also its negative side. Apart from the fact that your boss can see you weren’t actually sick that day last week because of your status…
>> CATEGORY: Security
SQL Server fingerprinting can be a time consuming process. It involves a lot many trial and error methods to fingerprint the exact SQL Server version. Intentionally inserting an invalid input…
Attackers are constantly changing their tactics and adapting to what the security community and researchers are doing, and it’s not unusual for the bad guys to adopt techniques used by…
The IT security industry is no stranger to urban myths: stories that spread and, over time, become accepted as general truths. Global IT vendor Panda Security has been asking its…
Back in 2007, the Burmese government reportedly severed the country’s Internet links in a crackdown over growing political unrest. Yesterday, Burma once again fell off the Internet. Over the last…
INSECURITY VENDOR Kaspersky Labs suffered a shocker over the weekend with the firm’s US website getting hacked.
Once again WiFi security is in the news, this time a new report in the UK shows that almost half of UK home WiFi networks could be compromised within 5…
The U.S. has by far the highest number of bot-infected computers of any country in the world, with nearly four times as many infected PCs as the country in second…
Patches – and plenty of them – took center stage this week as two big software companies shipped substantial updates. Some alarming news also broke regarding the growing number of…
A recent study shows that organized criminals create approximately 8,000 malicious websites every day, or over 57,000 each week. These malicious websites model legitimate websites that we visit every day,…