General

Last Updated on 13 Nov. 2014, Total: 153 Blog Posts

  1. Modular security for scaling network performance and extending to the cloud

    HP Enterprise Security webinar on January 17th - 9AM PT... Read More

  2. Webinar - Scalable Database Architectures

    Scalable Database Architectures Webinar... Read More

  3. Mobile DDoS may be coming - Just not now

    Mobile DDoS is possible but not feasible at the moment!... Read More

  4. New Cybercrime Center at Europol

    The Center will be the focal point in the EU’s fight against cyber-crime... Read More

  5. Your writing style can give you away!

    Researchers have found a technique based on linguistics that could track down users... Read More

  6. Appropriate security measures for smart grids

    The proposed security measures are organized into three sophistication levels and ten domains... Read More

  7. Amazon launches a new set of high storage instances

    The High Storage Eight Extra Large instances are intended for applications that require high storage depth and high sequential I/O performance... Read More

  8. A Merry Christmas to all!

    The WindowsNetworking.com team would like to wish you a merry Christmas and a happy New Year!... Read More

  9. Microsoft security updates for December 2012

    As part of Microsoft's routine monthly security update cycle, 7 new security updates were released on December 11, 2012. If you happen to perform a manual update of the latest security updates then I suggest visiting Microsoft's Safety & Security Centre at the link below and reviewing each and every update available for download. For instance, a critical update for... Read More

  10. Phishing scam aimed at Facebook users

    A fake social media application aimed at Facebook users enticed users to enter their login credentials to gain access to the fake security app which promotes the security of their Facebook accounts and prevent them from being hacked. Users are reminded to never provide personal information such as, login credentials to unknown and unverified pop-up pages/screens, third-party apps, email requests,... Read More

Featured Links