News

News Archive

  • August 15, 2006 15 Aug'06

    Qualcomm to halve storage growth in 2007

    Wireless chipmaker Qualcomm expects to slow down its storage growth by at least 50% next year using a capacity utilisation tool from MonoSphere.

  • August 14, 2006 14 Aug'06

    EMC sheds light on RSA integration plans

    As the dust begins to settle on EMC's $2.1 billion acquisition of RSA Security, the hard work of integration begins. What's EMC strategy here?

  • August 14, 2006 14 Aug'06

    Mocbot update targets MS06-040 flaw

    Security experts raised the red flag Sunday as new malware targets the Windows flaw addressed in the MS06-040 patch. Attackers are using the flaw to expand IRC-controlled botnets.

  • August 14, 2006 14 Aug'06

    Wireless security boost for laptops outside the office

    >Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks?

  • August 10, 2006 10 Aug'06

    Security Blog Log: Israeli-Hezbollah war spills into cyberspace

    This week blogosphere warily watches online attacks inspired by the Mideast conflict and rants over the latest security incidents at AOL and the VA.

  • August 10, 2006 10 Aug'06

    Vista kernel limits have security vendors on edge

    Microsoft's PatchGuard feature will prevent extension of Windows Vista kernel, and antivirus vendors say it'll make it harder for them to produce good security products.

  • August 10, 2006 10 Aug'06

    Symantec fixes Backup Exec flaw

    Attackers could exploit flaws in Symantec Backup Exec 9.1 and 9.2 for NetWare Servers to cause a denial of service, launch malicious code and gain access to vulnerable machines.

  • August 09, 2006 09 Aug'06

    Xiotech resurfaces with data compliance focus

    Xiotech has been busy acquiring a legal discovery software vendor and building a data compliance practice, but what about storage?

  • August 08, 2006 08 Aug'06

    Cheat sheet: Access management solutions and their pros and cons

    Popular authentication methods such as passwords, biometrics and two-factor are assessed in this chart.

  • August 08, 2006 08 Aug'06

    Users cautious about Brocade-McData merger

    Customers are worried about McData switches interoperating with other products and how Brocade will handle product overlap.

  • August 06, 2006 06 Aug'06

    Security Bytes: CA fixes eTrust Antivirus flaws

    Online thieves steal $700,000 from personal accounts, researchers expose e-passport vulnerability; and arrests are made in the VA security breach case.

  • August 06, 2006 06 Aug'06

    VoIP call quality on the decline

    Advances in technology have made VoIP more common, but that hasn't stopped VoIP call quality from dropping steadily over the last 18 months, according to a recent study by Brix Networks.

  • August 03, 2006 03 Aug'06

    Ajax threats worry researchers

    Black Hat: While it makes smooth Web applications like Google Maps possible, the rush to adopt Ajax may fuel haphazard development and a feeding frenzy among hackers.

  • August 03, 2006 03 Aug'06

    Vendors reject preferential knowledge sharing

    While Cisco continues to investigate a potential PIX firewall flaw, it and other vendors say sharing security information quickly and indiscriminately is always the best policy.