General

Last Updated on 3 April 2014, Total: 148 Blog Posts

  1. Be aware of fake Google’s Chrome installers for Windows

    Trend Micro, the antivirus vendor has identified suspicious URLs which appear to be hosted on legitimate sources such as, Facebook and Google domains that promote a malicious file called ChromeSetup.exe. This file has nothing to do with Google's Chrome installation but is simply an information-stealing Trojan application and is offered for download on various websites! An analysis of the file... Read More

  2. Best wishes for a happy and prosperous New Year.

    The WindowsNetworking.com team would like to wish you a merry Christmas and a happy New Year!... Read More

  3. CAN-SPAM Act

    The following are seven important things to remember if your organization is required to comply with the US CAN-SPAM Act. The CAN-SPAM Act sets the rules and establishes requirements for commercial email messages while; it sets out tough penalties for violations - non-compliance can cost your organization thousands of dollars! FTC has put together a handy video outlining seven simple... Read More

  4. Call for papers about Botnets

    Botconf’13 – Call for papers... Read More

  5. Can we learn from SCADA security incidents?

    Industrial Control Systems look more and more like consumer PCs. They are used everywhere and involve a considerable amount of software... Read More

  6. Career Development

    For those IT Professionals who would like to plan their future career based on a job role rather than technology or platform, I suggest Microsoft's Professional Career Chart. The chart is structured around the different roles we find in IT operations, management and software development based on Microsoft technologies. For example, an application developer can match his current job description,... Read More

  7. Cellphones That Can See Through Walls

    Researchers at the University of Texas in Dallas have designed an imager chip that could turn mobile phones into devices that can see through walls, wood, plastics, paper and other objects. The team's research linked two scientific advances. One involves tapping into an unused range in the electromagnetic spectrum. The other is a new microchip technology. Read more here -... Read More

  8. Cisco IOS XR Software Route Processor Denial of Service Vulnerability

    Customers that are running version 4.2.1 or later of Cisco IOS XR Software, or that have previously installed the Software Maintenance Upgrades (SMU) for Cisco bug ID CSCtz62593 are not affected by this vulnerability... Read More

  9. Cisco TelePresence VX Clinical Assistant Administrative Password Reset Vulnerability

    Cisco has released free software updates that address this vulnerability... Read More

  10. Cloud Computing Assurance Program

    Auditing or assessing risks related to cloud setups may seem daunting at first, especially if an IT audit and assurance professional may lack cloud computing experience. A fine book published by ISACA & ITGI can give you the necessary heads up to initiate an assurance process. It is an excellent starting point but remember that it has to be modified... Read More

Featured Links