Matthew Hines

SEO Poisoning Piggybacks on McAfee Update Glitch

After a flawed AV update issued by McAfee left thousands of the security company's customers scrambling to get their systems re-configured and back running normally, scammers have predictably moved...

Phony eBay Security Warnings on the Prowl

As cybercriminals continue to advance their attempts to cash-in on end users' sensitivity to potential security risks they're increasingly combining time-honored social engineering schemes with phony desktop alerts and...

People Still Tasting Spam Despite Getting Burned

Despite growing awareness that most of today's unsolicited e-mail constitutes some form of attack, many people continue to open and interact with the spam they receive and expose themselves...

Industry Frets Over Software Security

Based on the results of a survey conducted at last week's RSA Security Conference in San Francisco, IT security pros are more concerned than ever regarding the resiliency of...

RSA Redux: U.S. Cyber-Sec Experts Question Progress, Innovation

Experts speaking at the RSA Security Conference 2010 in San Francisco cited many of the same issues that have long thwarted U.S. cyber-security reform as the most significant problems...

Latest Posts

IBM Sets Another Smallness Record with 2nm Chip Blueprints

Okay, now that IBM has revealed its 2nm chip design and process blueprint, what's next? A virtual chip? Two nanometers is smaller in width...

Dell Unveils, Explains APEX ‘Portfolio-as-a-Service’

In one of its busiest news-making days in the last few years, Dell EMC on May 5 at its  virtualized Dell Technologies World unveiled...

Dell-VMware Split a Hot Topic for IT Watchers

An old Bob Dylan song titled “The Times They are A-Changin' ” reminds me of what’s going on in tech today. The reality is...

Why It’s Critical to Manage Privileges and Access Across Your Multi-Cloud Environments

Conventional approaches to privileged access and identity management are ineffective in today’s cloud-oriented DevSecOps environments. The concept of least privilege access still remains foundational...

Five Hidden Costs in Code Migration: How to Avoid Surprise Expenses

Migration to the cloud is in full flight. The most complex challenge involved in completing these migrations is not moving the data but migrating...