General

Last Updated on 27 Nov. 2014, Total: 154 Blog Posts

  1. "Body recognition" compares with fingerprint ID

    A range of human anatomical features and body measurements can help to identify a person, such as from closed circuit television (CCTV) security videos, no matter what clothing the person may be wearing... Read More

  2. 10 Common Mistakes of Incident Responders

    According to Michael Spohn of McAfee Foundstone Professional Services, the top 10 most common mistakes done by incident responders can be easily corrected. In fact, he compiled a list so that organizations can use it as a gauge of the effectiveness of their current incident response practices. Michael has vast experience in incident handling activities and he is a principal... Read More

  3. 10 tips for cyber security

    The UK Federation for Small Businesses (FSB) published a report about cyber security best practices focusing on small and micro businesses... Read More

  4. 16-bit legacy applications & Windows XP Mode

    Although, 16-bit legacy applications may have become something of the past there are still instances of these applications which are considered as critical to some businesses. In fact, last week during a conference I met an IT Manager who said that they still use a 16-bit finance package which was developed for the specific needs of the organization. Although, the... Read More

  5. A 31-minute webinar about Social Media & Cloud Computing Threats to Privacy, Security and Liberty

    WHAT TO TEACH YOUR KIDS, EMPLOYEES AND INTERNS ABOUT SOCIAL MEDIA... Read More

  6. A Merry Christmas to all!

    The WindowsNetworking.com team would like to wish you a merry Christmas and a happy New Year!... Read More

  7. A Turing Machine built using LEGO

    To show everyone how simple a computer actually is and to honor Alan Turing, Jeroen van den Bos and Davy Landman built a simple LEGO Turing Machine. Their goal was to make every operation as visible as possible while using just a single LEGO MINDSTORMS NXT set. Read more here - http://www.legoturingmachine.org/... Read More

  8. A merry Christmas to all!

    The WindowsNetworking.com team would like to wish you a merry Christmas and a happy New Year!... Read More

  9. API vulnerability in PayPal

    The Vulnerability Laboratory Research Team discovered a filter bypass & persistent web vulnerability in the official PayPal Inc Core Application API... Read More

  10. Alert Logic key findings about the state of Cloud Security

    The cloud is not inherently less safe. Among the six security incident categories examined, Web application attack was the only threat category more prevalent in cloud hosting provider environments than in enterprise environments... Read More

Featured Links