News
News Archive
-
March 04, 2007
04
Mar'07
NetApp stokes midrange fires with new array
The FAS 3040 is a scaled down version of the 64-bit 3070 architecture; NetApp officials say more moves downmarket will follow.
-
March 02, 2007
02
Mar'07
Police force secures data with biometrics
Humberside Police has issued biometric USB drives among staff to maintain data security.
-
March 01, 2007
01
Mar'07
Linksys, Gateway launch low-end NAS
Cisco subsidiary Linksys and PC maker Gateway launch new NAS products for small businesses and consumers.
-
February 28, 2007
28
Feb'07
RFID cloning presentation moves forward despite legal threats
Chris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology.
-
February 28, 2007
28
Feb'07
Can setting up a VPN help you get around blocked VoIP ports?
Can setting up a VPN help you get around blocked VoIP ports?
-
February 27, 2007
27
Feb'07
Wireless security: IT pros warily watching mobile phone threats
Security experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them.
-
February 27, 2007
27
Feb'07
'Worm' targets Sun Solaris Telnet flaw
Security researchers have found evidence that a worm is trying to exploit the recently patched Telnet flaw in Sun Solaris. Experts say it's another reason to stay away from Telnet.
-
February 27, 2007
27
Feb'07
McAfee fixes flaw in Mac antivirus software
Attackers could exploit the hole in McAfee's Virex 7.7 antivirus program for Mac OS X to bypass the malware scanner, but a fix is available.
-
February 27, 2007
27
Feb'07
Black Hat presenter nixes RFID cloning demo under pressure
A demonstration of a device that could easily clone radio frequency identification (RFID) badges, was pulled from a conference presentation under pressure from a chip maker.
-
February 27, 2007
27
Feb'07
High-end storage array specifications
The key specifications for a cross section of popular high-end disk storage array products.
-
February 27, 2007
27
Feb'07
Corel offers WordPerfect for free
Corel has made available a beta version of its WordPerfect Lightning software for free, in a bid to attract users into buying the advanced commercial version.
-
February 27, 2007
27
Feb'07
Home Office to introduce new police database to fight gun crime
Home secretary John Reid has announced a new information database to help tackle increasing gun crime.
-
February 26, 2007
26
Feb'07
Sun scraps 6920 array, offloads support to HDS
The long-rumored deal that Sun will sell its 6920 virtualization array to HDS is done. But rather than developing the product, HDS will upgrade users to its TagmaStore instead.
-
February 26, 2007
26
Feb'07
HP acquires clustered file system software maker PolyServe
HP announced its intent to acquire clustered file system maker PolyServe.
-
February 26, 2007
26
Feb'07
Pilkington gets flexible with Infor
Pilkington, the global glass manufacturer, is poised to go live with Infor software designed to predict demand for its auto-glass aftermarket, after the firm found the required level of functionality was not available in its core enterprise resource...
-
February 26, 2007
26
Feb'07
Storm rages again: Self-morphing Trojan uses blogs to spread rootkits
A new variant of the Storm Trojan that changes with each download is infecting blog sites with malicious URLs, intercepting traffic when visitors try to post comments.
-
February 25, 2007
25
Feb'07
HP announces iSCSI VTL for SMBs
HP's new iSCSI VTL devices include automated backup capabilities for users with fewer than four servers.
-
February 25, 2007
25
Feb'07
Storage switch startup burns out, turns to security
The company formerly known as Maxxan has been rechristened CipherMax and is now marketing a storage switch/encryption appliance with one point of management.
-
February 25, 2007
25
Feb'07
PatchLink acquires STAT Guardian tool
PatchLink says it will add more muscle to its vulnerability management portfolio by acquiring the STAT Guardian tool from IT vendor Harris Corp.
-
February 25, 2007
25
Feb'07
IP PBX: Ten reasons to switch
Should you throw out the old PBX and replace it with a new IP PBX? This tip from WindowsNetworking.com provides ten compelling reasons to do so.
-
February 25, 2007
25
Feb'07
Does an organization have to have an IP PBX in order to have a unified communications system?
Does an organization have to have an IP PBX in order to have a unified communications system?
-
February 25, 2007
25
Feb'07
Gartner: Quad-core slowed 2006 server sales
New Gartner data suggests that quad-core servers are not exciting users.
-
February 22, 2007
22
Feb'07
Google offers 10 GB inbox
The search engine giant is offering an email application on a subscription basis with five times the storage capacity of the free version.
-
February 21, 2007
21
Feb'07
Cisco warns of IP phone flaws
Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday.
-
February 20, 2007
20
Feb'07
Microsoft confirms new IE flaw
Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday.
-
February 20, 2007
20
Feb'07
Cisco routers threatened by drive-by pharming
Millions of Cisco routers in circulation could be compromised by a newly-discovered attack technique Symantec calls drive-by pharming, the networking giant warned in an advisory.
-
February 20, 2007
20
Feb'07
Cisco to acquire Reactivity for $135 million
One analyst says Cisco will benefit from Reactivity's policy and threat management capabilities.
-
February 20, 2007
20
Feb'07
Google plugs dangerous flaw
An attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it.
-
February 20, 2007
20
Feb'07
TJX data breach worse than initially feared
Hackers had access to a larger amount of customer data, TJX executives said in a statement.
-
February 20, 2007
20
Feb'07
All about automation
Automating your IT operations is a trick that creates obvious benefits. In this article, we explain how data center automation can help an entire enterprise.
-
February 19, 2007
19
Feb'07
Sourcefire fixes Snort flaw
Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code.
-
February 19, 2007
19
Feb'07
When security firms merge, some users are losers
Some users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold.
-
February 19, 2007
19
Feb'07
Quiz: Compliance improvement -- Get better as you go forward
A five-question multiple-choice quiz to test your understanding of the content presented by expert Richard Mackey in this lesson of SearchSecurity.com's Compliance School.
-
February 19, 2007
19
Feb'07
What is presence?
Presence technology makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.
-
February 19, 2007
19
Feb'07
What is unified communications?
Defining unified communications.
-
February 19, 2007
19
Feb'07
What is communication-enabled-business processes (CEBP)?
Defining communication-enabled business processes.
-
February 18, 2007
18
Feb'07
CDP platform purchase considerations
Busy IT organizations are employing continuous data protection (CDP) technologies to guard data on the fly, essentially eliminating the backup window and allowing granular file and system restoration -- sometimes down to the individual disk write ...
-
February 15, 2007
15
Feb'07
News Wrap 2.0
We've just discovered a great new application for technology that can save you an incredible amount of time, money and heartache.
-
February 14, 2007
14
Feb'07
VoIP complexities stall implementation for SMBs
VoIP sales in the SMB market are predicted to lead revenue in the next several years, but most SMBs are confused by the number of different solutions.
-
February 14, 2007
14
Feb'07
New attack technique threatens broadband users
Millions of broadband users across the globe are threatened by a new attack technique called drive-by pharming
-
February 14, 2007
14
Feb'07
Cancer clinic juggles two-tiered storage environments
Karmanos Cancer Institute is using two separate tiered storage systems from EMC and Sun, and says it has yet to find a single storage vendor that can meet all its requirements.
-
February 14, 2007
14
Feb'07
Cisco VoIP managment guide: Required management tasks
Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is ...
-
February 13, 2007
13
Feb'07
Fortune 500 firm takes a crack at data classification
A life sciences company undertakes a data classification project with Abrevity and discovers the job is never done.
-
February 12, 2007
12
Feb'07
Mobile carriers admit to malware attacks
Eighty-three percent of mobile operators surveyed by McAfee Inc. say they've suffered malware infections, but two competing security vendors say the overall threat is still small.
-
February 12, 2007
12
Feb'07
Microsoft fixes zero-day flaws in Word, Office
Twelve security updates from Microsoft fix a range of problems, including a flaw in the Malware Protection Engine and previously-exploited zero-days glitches in Word and Office.
-
February 12, 2007
12
Feb'07
Siemens' acquisition of UGS 'will benefit users'
-
February 12, 2007
12
Feb'07
Skype makes more enterprise inroads
Skype has teamed with FaceTime Communications to give companies more control over Skype use within the enterprise.
-
February 11, 2007
11
Feb'07
VoIP helps ensure disaster recovery
VoIP bolsters your disaster recovery plans and should be at the core of any well-planned disaster recovery strategy.
-
February 11, 2007
11
Feb'07
Solaris 10 has zero-day Telnet flaw
Attackers could exploit a zero-day flaw in Solaris 10's Telnet daemon to bypass authentication and gain unauthorized system access, security experts warn.
-
February 11, 2007
11
Feb'07
Cybersecurity czar signals government cooperation at RSA Conference
Cybersecurity chief, Greg Garcia told RSA Conference attendees that government, enterprises and academia need to work together to fight growing Internet threats.