Results »

Microsoft Patch Tuesday – November 2015 November 10, 2015 under the “Patch Tuesday” Microsoft released 12 security bulletins, which correct a total of 49 vulnerabilities in the company’s products. Four of them are critical, the other eight – important. Critical patches are for flaws in Windows, Internet Explorer, and the new browser Edge, allowing remotely […]

The SiteLock services specialize in malware detection and removal. Conventional web protection models are often insufficient in the face of organized hacking attacks. If malware products infect your site, the search engine deems you unsafe. So, the visitors face a blocked wall of security warning. This is highly damaging for any business service.

Small businesses are easy targets for cybercriminals, yet many don’t have security in place to protect their data. The cost is often the company itself. Small businesses are just as vulnerable to data loss as large enterprises. In fact, small businesses may be at greater risk because they make easy targets. This is because their […]

A developing technology The use of mobile phones to connect to the Web is over twenty years old, just a year older than the Web itself, but the danger of threats to one’s identity and personal computer files from online by viruses and malware have only recently begun to be understood, and similar threats to […]

Business security requires fighting threats on many fronts, and there’s no single solution that will keep a business protected against issues like cyber attacks, data theft, and digital file loss. Creating an arsenal of tools to fight security risks is best handled by using the best devices for each area of business security, from physical […]

Wi-Fi (Wireless Fidelity) – is the standard on the equipment for the broadband radio communication intended for the organization of the local wireless networks (Wireless LAN). Wireless security should be given special consideration. Because wi-fi is a wireless network and, moreover, with a large range. Accordingly, an attacker can intercept information, or to attack your […]

ESET NOD32 File Security – a new solution for file server protection ESET company released a new product for File Servers – ESET NOD32 File Security, which is already available for purchase. Solutions ESET NOD32 File Security designed to protect file servers running under Windows, Linux / BSD / Solaris. ESET NOD32 File Security for […]

Kali Linux, Successor of the BackTrack Penetration Testing Distro. The authors BackTrack presented Kali Linux 1.0, a new distribution for security checks of operating system. Offensive Security company introduced a new distribution for security research of the system – Kali Linux, which replaced the earlier developing project BackTrack Linux and released instead of the expected […]

Kaspersky releases test products Anti-Virus 2014 and Internet Security 2014 The company Kaspersky Lab has announced the availability of test versions (Technical Previews) products Kaspersky Anti-Virus 2014 and Kaspersky Internet Security 2014. These popular apps make the web safer and provide effective protection for your computer and stored its data from a variety of threats. […]

Modern programmers poorly represent the real work of a computer system. Now program the information objects, rather than specific pieces of silicon. For the vast majority of people who consider themselves programmers processor is a kind of phantom object, with some conventional characteristics and properties, the main criteria which are abstract Gigahertz, Core, Cache and […]