News

News Archive

  • February 27, 2007 27 Feb'07

    'Worm' targets Sun Solaris Telnet flaw

    Security researchers have found evidence that a worm is trying to exploit the recently patched Telnet flaw in Sun Solaris. Experts say it's another reason to stay away from Telnet.

  • February 27, 2007 27 Feb'07

    Wireless security: IT pros warily watching mobile phone threats

    Security experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them.

  • February 27, 2007 27 Feb'07

    High-end storage array specifications

    The key specifications for a cross section of popular high-end disk storage array products.

  • February 27, 2007 27 Feb'07

    Black Hat presenter nixes RFID cloning demo under pressure

    A demonstration of a device that could easily clone radio frequency identification (RFID) badges, was pulled from a conference presentation under pressure from a chip maker.

  • February 27, 2007 27 Feb'07

    Corel offers WordPerfect for free

    Corel has made available a beta version of its WordPerfect Lightning software for free, in a bid to attract users into buying the advanced commercial version.

  • February 27, 2007 27 Feb'07

    Home Office to introduce new police database to fight gun crime

    Home secretary John Reid has announced a new information database to help tackle increasing gun crime.

  • February 26, 2007 26 Feb'07

    Pilkington gets flexible with Infor

    Pilkington, the global glass manufacturer, is poised to go live with Infor software designed to predict demand for its auto-glass aftermarket, after the firm found the required level of functionality was not available in its core enterprise resource...

  • February 26, 2007 26 Feb'07

    Sun scraps 6920 array, offloads support to HDS

    The long-rumored deal that Sun will sell its 6920 virtualization array to HDS is done. But rather than developing the product, HDS will upgrade users to its TagmaStore instead.

  • February 26, 2007 26 Feb'07

    HP acquires clustered file system software maker PolyServe

    HP announced its intent to acquire clustered file system maker PolyServe.

  • February 26, 2007 26 Feb'07

    Storm rages again: Self-morphing Trojan uses blogs to spread rootkits

    A new variant of the Storm Trojan that changes with each download is infecting blog sites with malicious URLs, intercepting traffic when visitors try to post comments.

  • February 25, 2007 25 Feb'07

    Storage switch startup burns out, turns to security

    The company formerly known as Maxxan has been rechristened CipherMax and is now marketing a storage switch/encryption appliance with one point of management.

  • February 25, 2007 25 Feb'07

    HP announces iSCSI VTL for SMBs

    HP's new iSCSI VTL devices include automated backup capabilities for users with fewer than four servers.

  • February 25, 2007 25 Feb'07

    PatchLink acquires STAT Guardian tool

    PatchLink says it will add more muscle to its vulnerability management portfolio by acquiring the STAT Guardian tool from IT vendor Harris Corp.

  • February 25, 2007 25 Feb'07

    IP PBX: Ten reasons to switch

    Should you throw out the old PBX and replace it with a new IP PBX? This tip from WindowsNetworking.com provides ten compelling reasons to do so.

  • February 25, 2007 25 Feb'07

    Does an organization have to have an IP PBX in order to have a unified communications system?

    Does an organization have to have an IP PBX in order to have a unified communications system?

  • February 25, 2007 25 Feb'07

    Gartner: Quad-core slowed 2006 server sales

    New Gartner data suggests that quad-core servers are not exciting users.

  • February 22, 2007 22 Feb'07

    Google offers 10 GB inbox

    The search engine giant is offering an email application on a subscription basis with five times the storage capacity of the free version.

  • February 21, 2007 21 Feb'07

    Cisco warns of IP phone flaws

    Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday.

  • February 20, 2007 20 Feb'07

    Cisco routers threatened by drive-by pharming

    Millions of Cisco routers in circulation could be compromised by a newly-discovered attack technique Symantec calls drive-by pharming, the networking giant warned in an advisory.

  • February 20, 2007 20 Feb'07

    Cisco to acquire Reactivity for $135 million

    One analyst says Cisco will benefit from Reactivity's policy and threat management capabilities.

  • February 20, 2007 20 Feb'07

    Microsoft confirms new IE flaw

    Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday.

  • February 20, 2007 20 Feb'07

    Google plugs dangerous flaw

    An attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it.

  • February 20, 2007 20 Feb'07

    TJX data breach worse than initially feared

    Hackers had access to a larger amount of customer data, TJX executives said in a statement.

  • February 20, 2007 20 Feb'07

    All about automation

    Automating your IT operations is a trick that creates obvious benefits. In this article, we explain how data center automation can help an entire enterprise.

  • February 19, 2007 19 Feb'07

    Sourcefire fixes Snort flaw

    Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code.

  • February 19, 2007 19 Feb'07

    When security firms merge, some users are losers

    Some users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold.

  • February 19, 2007 19 Feb'07

    Quiz: Compliance improvement -- Get better as you go forward

    A five-question multiple-choice quiz to test your understanding of the content presented by expert Richard Mackey in this lesson of SearchSecurity.com's Compliance School.

  • February 19, 2007 19 Feb'07

    What is presence?

    Presence technology makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.

  • February 19, 2007 19 Feb'07

    What is unified communications?

    Defining unified communications.

  • February 19, 2007 19 Feb'07

    What is communication-enabled-business processes (CEBP)?

    Defining communication-enabled business processes.

  • February 18, 2007 18 Feb'07

    CDP platform purchase considerations

    Busy IT organizations are employing continuous data protection (CDP) technologies to guard data on the fly, essentially eliminating the backup window and allowing granular file and system restoration -- sometimes down to the individual disk write ...

  • February 15, 2007 15 Feb'07

    News Wrap 2.0

    We've just discovered a great new application for technology that can save you an incredible amount of time, money and heartache.

  • February 14, 2007 14 Feb'07

    VoIP complexities stall implementation for SMBs

    VoIP sales in the SMB market are predicted to lead revenue in the next several years, but most SMBs are confused by the number of different solutions.

  • February 14, 2007 14 Feb'07

    Cancer clinic juggles two-tiered storage environments

    Karmanos Cancer Institute is using two separate tiered storage systems from EMC and Sun, and says it has yet to find a single storage vendor that can meet all its requirements.

  • February 14, 2007 14 Feb'07

    New attack technique threatens broadband users

    Millions of broadband users across the globe are threatened by a new attack technique called drive-by pharming

  • February 14, 2007 14 Feb'07

    Cisco VoIP managment guide: Required management tasks

    Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is ...

CIO
Security
Networking
Data Center
Data Management
Close