Read more about tips
Bookmark and Share
  • Securing the virtual environment

    11.07.2014

    So you have you a shiny new virtual environment up and running.

  • Big Data security mistakes, tips and tricks

    09.07.2014

    In this interview, Mark Cusack, Chief Architect at RainStor, talks about the main challenges of handling petabyte-scale volumes of data, illustrates the most obvious mistakes that companies make with their Big Data projects and offers advice to organizations about to welcome Big Data into their cloud storage environments.

  • Free guide: Introduction to Linux

    09.07.2014

    This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.

  • Risks of selling used smartphones

    08.07.2014

    AVAST Software easily retrieved personal data from used smartphones sold online, despite consumers deleting their data.

  • Cloud security threats, tips and best practices

    08.07.2014

    In this interview, Gray Hall, CEO at Alert Logic, illustrates today's top cloud security threats, tackles privacy and surveillance issues, and offers security best practices organizations should implement when moving to the cloud.




Spotlight

Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //