News
News Archive
-
November 30, 2006
30
Nov'06
Oracle responds to security critics
Security Blog Log: Oracle takes on researchers who have criticised its security procedures in recent weeks. Meanwhile, Symantec warns of new zombie malware.
-
November 30, 2006
30
Nov'06
Video conferencing brings desktop VoIP, app sharing
Voice, video and Web conferencing vendor Genesys adds desktop VoIP and enhanced application sharing to its collaboration lineup.
-
November 30, 2006
30
Nov'06
Gartner: Existing business continuity plans will fail in a pandemic
Existing business continuity plans will not protect a company during an avian flu pandemic, says a Gartner analyst. Business continuity plans assume a geographically specific disaster, while a pandemic will strike everywhere nearly simultaneously.
-
November 29, 2006
29
Nov'06
Video conferencing brings desktop VoIP, app sharing
Voice, video and Web conferencing vendor Genesys adds desktop VoIP and enhanced application sharing to its collaboration lineup.
-
November 29, 2006
29
Nov'06
Multiple flaws in Adobe Reader, Acrobat
Multiple flaws in Adobe Reader and Acrobat could allow attackers to execute malicious commands on victims' computers.
-
November 29, 2006
29
Nov'06
Podcast: Security certifications pay could rebound in '07
Security certifications pay is languishing, according to skill and certifications pay expert David Foote of Foote Research. Foote examines the state of the IT security job market.
-
November 28, 2006
28
Nov'06
Symantec fixes NetBackup Puredisk flaw
An unauthorised user could launch malicious code by exploiting a flaw in Symantec's Veritas NetBackup PureDisk product. But a fix is available.
-
November 28, 2006
28
Nov'06
Adware targets Mac OS X
As F-Secure notes what may be the first example of adware designed for Macs, researcher LMH reports more flaws in the operating system as part of the Month of Kernel Bugs.
-
November 28, 2006
28
Nov'06
Effective wireless security is available, but holes exist
Specialist vendors offer products that allow even small businesses to run a secure wireless network without paying a high price, but that doesn't mean companies are using it.
-
November 28, 2006
28
Nov'06
Study: Some firms balk at mobile security
Companies are failing to safeguard sensitive data on employee mobile devices, according to a survey by the Business Performance Management Forum.
-
November 28, 2006
28
Nov'06
Apple fixes 22 Mac OS X flaws
The patches include a fix for a Wi-Fi flaw reported earlier this month as part of the Month of Kernel Bugs. A number of other flaws remain unfixed, however.
-
November 26, 2006
26
Nov'06
Static routing for Cisco users [Day Two: The good and bad of static routing]
What is static routing good for? And what are its shortcomings? Read on to discover how and when to use this technique.
-
November 26, 2006
26
Nov'06
Managed and hosted VoIP: muddling through
Managed and Centrex and hosted, oh my! For companies looking for an alternative to a premise-based phone system, there are plenty available, and they come in all shapes and sizes. Get a clearer understanding of exactly what's available so you can ...
-
November 26, 2006
26
Nov'06
Storage management tools get more flexible
After a decade of proprietary storage management tools, vendors are finally giving users more choices and freeing them up to buy only what they need.
-
November 26, 2006
26
Nov'06
Virtualisation buying guide [Day Two: Virtualisation software examined]
Deploying software on a server or dedicated appliance is often easier for smaller organisations, but the actual product choice demands careful consideration. Now that you've reviewed the essential issues involved in any virtualisation product, this ...
-
November 23, 2006
23
Nov'06
Commentary: We've never met a "thought follower"
A couple of days back, a vendor tried to convince us that their new security consultancy services should be of interest to you, our readers.
-
November 23, 2006
23
Nov'06
Commentary: We've never met a "thought follower"
A couple of days back, a vendor tried to convince us that their new security consultancy services should be of interest to you, our readers.
-
November 22, 2006
22
Nov'06
Zango defying FTC agreement, researchers say
This week in Security Blog Log: Two researchers accuse Zango of unsavory adware tactics, despite the company's pledge to clean up its act.
-
November 21, 2006
21
Nov'06
New Mac OS X flaw exposed
A Mac OS X flaw was exposed as part of the Month of Kernel Bugs. Also, a new Web site vows to follow the lead of researchers LMH and H.D. Moore with a week of Oracle zero-days.
-
November 21, 2006
21
Nov'06
Skills gap grips India's budding storage market
India is the second fastest growth market for storage technology in Asia Pacific after China, according to IDC, but a skills shortage could hamper growth, experts say.
-
November 21, 2006
21
Nov'06
Virtual SAN purchase considerations
The specific considerations for key virtual SAN products plus a series of specifications to help make on-the-spot product comparisons between vendors.
-
November 21, 2006
21
Nov'06
Virtual SAN product specifications
Product snapshots that highlight key specifications for a cross-section of VSAN platforms selected based on input from industry analysts and SearchStorage.com editors.
-
November 21, 2006
21
Nov'06
BakBone brushes up replication software
BakBone's NetVault Replicator version 5.0 includes automatic configuration of replication for remote sites, a capacity planning tool and a higher performance data movement engine.
-
November 21, 2006
21
Nov'06
Long-term archiving needs better media, experts say
The hundred-year archive is coming soon, and industry watchers say a new physical medium for long-term storage should come with it.
-
November 21, 2006
21
Nov'06
Telecom overspending -- thwart it!
Research has found that telecom overspending is out of control, but a new batch of software is out there to help enterprises get a handle on their telecom billing.
-
November 21, 2006
21
Nov'06
Firefox, IE flaw could expose passwords
A flaw in Firefox 2.0 and IE could affect anyone visiting a Web site that allows user-contributed HTML codes to be added, according to Chapin Information Services.
-
November 20, 2006
20
Nov'06
Insider security threats come in many forms
Insiders could be the greatest threat to a company's security. The best defense is to let them know Big Brother is watching and a plan to deal with troublemakers.
-
November 20, 2006
20
Nov'06
BakBone NetVault upsets in Quality Awards, page 5
About the authors and the backup software survey.
-
November 20, 2006
20
Nov'06
Backup software: BakBone upsets in Quality Awards, page 3
Evaluating backup software products over the long haul: product reliability and repurchasing intentions.
-
November 20, 2006
20
Nov'06
Backup software: BakBone upsets in Quality Awards
This year's Diogenes Labs-Storage magazine Quality Awards for backup software had a come-from-behind winner: BakBone's NetVault.
-
November 20, 2006
20
Nov'06
Backup software: BakBone upsets in Quality Awards, page 4
The results for tech support and salesforce competence in backup software.
-
November 20, 2006
20
Nov'06
Backup software: BakBone upsets in Quality Awards, page 2
BakBone was the overall winner, but beaten out by CommVault in the product features category of our backup software Quality Awards.
-
November 19, 2006
19
Nov'06
Virtualisation: friend or foe? [Day Two: The virtual appliance]
Virtualisation slashes costs, makes management easier, unshackles software configurations from hardware. And it is being embraced around the world. But is it secure? In this three-part series, Patrick Gray explores the security implications of this ...
-
November 16, 2006
16
Nov'06
How can a small business achieve high quality VoIP?
As a small trader, I must be able to communicate with my trading partners who are often in other countries. We use IP telephony to keep costs down. Can you suggest how I can have high quality VoIP calls that will exceed PSTN call quality?
-
November 16, 2006
16
Nov'06
Why do VoIP calls remain active after the phone call is ended?
For our small business needs, we use a Linksys PAP for our IP telephony service. Sometimes though, we noticed that the call will remain active after we have ended the call and hung up. How do we configure the ATA or gateway to avoid this problem?
-
November 16, 2006
16
Nov'06
Why is UDP used more in VoIP than TCP?
If UDP is unreliable, why is it used more in VoIP rather than TCP?
-
November 16, 2006
16
Nov'06
What is the difference between VoIP, CTI and IP telephony?
What is the difference between VoIP, CTI (Computer Telephony Integration) and IP telephony?
-
November 16, 2006
16
Nov'06
Can VoIP work on a GPRS-enabled mobile phone?
Is it possible to use VoIP on GPRS-enabled mobile phones?
-
November 16, 2006
16
Nov'06
When should a VoIP system be analyzed and with what tools?
We have recently implemented a VoIP network with separate VLANs and QoS. It all seemed to be working fine when it first went in, but recently, certain people have been complaining about sound breakup whilst talking to customers on the phone.
-
November 16, 2006
16
Nov'06
VoIP news briefs: Verizon Business, TheInfoPro and Ovum
Verizon Business introduces a new management portal; TheInfoPro looks at the rate of VoIP adoption; and Ovum warns of VoIP security threats.
-
November 15, 2006
15
Nov'06
How is average repair time determined for both a TDM PBX and a VoIP system?
I am trying to find some statistics on average time to repair or troubleshoot VoIP and TDM PBX. We heard PBX takes 30 minutes versus VoIP at 4.5 hours -- is this true?
-
November 15, 2006
15
Nov'06
How can VoIP be integrated into an existing PBX system?
I am trying to integrate VoIP into my existing PBX system. I have a Talkswitch 48CVA which supports both PSTN and VoIP lines. My main phone number is a landline which forwards calls to my VoIP line when my status is busy or I do not answer.
-
November 15, 2006
15
Nov'06
EMC, NetApp duke it out in the midrange storage
As NetApp gains market share in midrange storage, EMC makes a rare response to performance claims.
-
November 14, 2006
14
Nov'06
SANS: VoIP, zero-day threats surge
Digital miscreants are using VoIP and a growing pile of zero-day flaws to launch a ferocious wave of targeted, financially-motivated attacks, according to the SANS Institute.
-
November 14, 2006
14
Nov'06
Fiber optic networks vulnerable to attack
Fiber optic networks aren't hack-proof: A savvy attacker can crack them with ease.
-
November 13, 2006
13
Nov'06
Trojan poses as Adobe software update
The Trojan keylogger comes in an email that asks users to download the latest version of Adobe Reader. It then tries to steal the user's confidential information.
-
November 13, 2006
13
Nov'06
IM, Skype, P2P open security holes: Survey
IM, Skype, Web conferencing and other real-time applications are a major concern to IT, but end users seem to shrug off the risks, a new survey has found.
-
November 13, 2006
13
Nov'06
Firefox antiphishing feature beats Internet Explorer in Mozilla test
A Firefox automated antiphishing feature beat IE 7 in a test conducted by Mozilla, but analysts say large enterprises should focus on spam blocking software.
-
November 12, 2006
12
Nov'06
Wireless device flaw discovered
A Broadcom wireless device driver, common in millions of laptops, is vulnerable to an attack, according to an advisory from the Month of Kernel Bugs.
-
November 10, 2006
10
Nov'06
The big security/storage crossover: Is your job safe? [Part Four: The new age of abstraction]
The collision of storage and security will mean chances for professionals in both disciplines to accelerate their careers into areas where strategic and business skills become more important than technical sills alone, according to David Webster, ...