General

Last Updated on 25 Aug. 2015, Total: 167 Blog Posts

  1. An overview of security articles in EU legislation

    A whitepaper published by the European network and Information Security Agency (ENISA) gives an overview of the legal aspects of cyber security in the European Union (EU). Although, the majority of data breaches do normally make it to the press but there are many breaches which remain either undetected or not reported. EU considers effective legislation is key here and... Read More

  2. Another APT Campaign discovered - OPERATION BEEBUS

    APTs focus on stealing personal/organizational sensitive information to achieve financial gain... Read More

  3. Appropriate security measures for smart grids

    The proposed security measures are organized into three sophistication levels and ten domains... Read More

  4. Authentication Vulnerability in Microsoft Yammer Social Network

    Yammer is a secure, private social network for private communication within organizations or between organizational members and pre-designated groups... Read More

  5. Be aware of fake Google’s Chrome installers for Windows

    Trend Micro, the antivirus vendor has identified suspicious URLs which appear to be hosted on legitimate sources such as, Facebook and Google domains that promote a malicious file called ChromeSetup.exe. This file has nothing to do with Google's Chrome installation but is simply an information-stealing Trojan application and is offered for download on various websites! An analysis of the file... Read More

  6. Best wishes for a happy and prosperous New Year.

    The WindowsNetworking.com team would like to wish you a merry Christmas and a happy New Year!... Read More

  7. CAN-SPAM Act

    The following are seven important things to remember if your organization is required to comply with the US CAN-SPAM Act. The CAN-SPAM Act sets the rules and establishes requirements for commercial email messages while; it sets out tough penalties for violations - non-compliance can cost your organization thousands of dollars! FTC has put together a handy video outlining seven simple... Read More

  8. Call for papers about Botnets

    Botconf’13 – Call for papers... Read More

  9. Can we learn from SCADA security incidents?

    Industrial Control Systems look more and more like consumer PCs. They are used everywhere and involve a considerable amount of software... Read More

  10. Career Development

    For those IT Professionals who would like to plan their future career based on a job role rather than technology or platform, I suggest Microsoft's Professional Career Chart. The chart is structured around the different roles we find in IT operations, management and software development based on Microsoft technologies. For example, an application developer can match his current job description,... Read More

Featured Links