Techworld

Stories by Tim Greene

Mitel takes aim at Avaya with ShoreTel bid

Anyone thinking about signing a deal with ShoreTel for unified communications gear might want to take a closer look now that Mitel has made public its hopes to buy the company.

By Tim Greene | 21 October, 2014 08:59

Tags: unified communications, Synergy, telecommunication, Networking, voip, Microsoft, ShoreTel Cisco Unified Communications, Shoretel, Avaya

Hordes of cable modems, Web cams, printers can become DDoS launch platforms

Attackers are mounting distributed Denial-of-service attacks from home routers, wireless access points, cable modems, Web cams and printers by taking advantage of weaknesses in the protocol they use to announce themselves on networks, according to PLXsert.

By Tim Greene | 17 October, 2014 03:32

Tags: Google, security, Prolexic, malware

Review: Surface Pro 3 isn't really what enterprises want in a laptop

There are a lot of good things to say about Microsoft's Surface Pro 3 tablet.

By Tim Greene | 11 October, 2014 00:11

Tags: Microsoft Subnet, Microsoft, hardware systems, intel

Patch Tuesday: Windows, Internet Explorer need critical patches

Windows and Internet Explorer need critical patches this month, according to Microsoft's advanced notification about Patch Tuesday bulletins for Oct. 14.

By Tim Greene | 10 October, 2014 09:07

Tags: Microsoft, Rapid7, Windows, software, operating systems

Microsoft offers sweeteners to get enterprises to buy Surface Pro 3

Microsoft is wooing enterprise IT purchasing execs with a set of enticements it hopes will convince them to buy Surface Pro 3 – "the tablet that can replace your laptop" – to actually replace corporate laptops.

By Tim Greene | 10 October, 2014 07:18

Tags: Microsoft Subnet, Microsoft, hardware systems, tablets

Startup Outlier grabs endpoint forensic data without agent software

Outlier, a startup with a sound pedigree in network security, is launching an endpoint threat-detection system that sets itself apart from competitors by working without the need for an agent on every machine.

By Tim Greene | 08 October, 2014 07:38

Tags: Gartner, security

Windows 8.1 backups can leave sensitive files exposed to Internet

The handy File History feature in Windows 8 and 8.1 is a convenience and a time-saver, but if set up without security in mind it can expose sensitive files to anyone on the Internet, security pros were told at a conference.

By Tim Greene | 02 October, 2014 23:16

Tags: security, Microsoft, Windows, software, operating systems

Expert: Basic hacks can compromise industrial control systems

Atlanta -- Sophisticated attacks like Stuxnet aren't necessary to compromise industrial control systems for dams, power plants, chemical plants and the like. Rather, simple phishing attacks followed up by using tools that are easily available through Metasploit will do the trick, security pros were told at a conference in Atlanta this week.

By Tim Greene | 02 October, 2014 04:18

Tags: Apple, SCADA, Shell, security, Windows, software, operating systems, Oracle

Likes of Apple Pay may make smaller banks more vulnerable

Many banks with less than $50 billion in assets have a problem that payment systems like Apple Pay will make even more attractive to exploit, a team of security researchers says.

By Tim Greene | 30 September, 2014 23:51

Tags: Target, Apple, security, Home Depot

9 things to look for in Windows 9

Microsoft is holding a press briefing Tuesday to broadly discuss the future of Windows, but the expectation is that the company will also introduce specifics of Windows 9, including features such as Cortana and virtual desktops.

By Tim Greene | 30 September, 2014 00:07

Tags: Microsoft Subnet, Microsoft, software, Windows 9

What corporate security pros should do about Shellshock/Bash bug

Shellshock/bash bug exploits can force compromised servers to act as bots and, depending on the types of privileges the servers have, attackers can make them do a lot worse. So corporate security pros should patch important affected machines as soon as possible.

By Tim Greene | 26 September, 2014 23:32

Tags: U.S. Army, Shellshock, Shell, EE, security, CSO

Bot-herders can launch DDoS attacks from dryers, refrigerators, other Internet of Things devices

A new malware kit called Spike can infect not only traditional desktops but also routers, smart thermostats, smart dryers and a host of other Internet of Things devices to herd them into massive botnets.

By Tim Greene | 25 September, 2014 04:53

Tags: security, Prolexic, malware

Ray Ozzie's Talko app stores calls in cloud, lets you search them

Ray Ozzie -- the father of Lotus Notes -- has launched Talko, a smartphone app that records group phone calls, stores them and makes them searchable so group members can go back and listen to key parts of the call and lets participants shoot and insert photos into the call stream in real time.

By Tim Greene | 24 September, 2014 04:02

Tags: mobile applications, Lotus, smartphone, mobile, mobile apps, Oracle

Ping Identity picks up $35 million more in venture funding

Ping Identity has picked up another $35 million in venture funding to speed development of the next-generation of its identity and access management technology and expand the company's presence in Europe and Asia-Pacific.

By Tim Greene | 20 September, 2014 00:36

Tags: Identity & Access Management, security, Ping Identity

Report: Bad communication among defense agencies makes China hacks more dangerous

It's not just the fact that China has been hacking U.S. military contractors' networks, it's that the agencies discovering the breaches and the contractors themselves haven't been telling other agencies that need to know, a U.S. Senate report says.

By Tim Greene | 19 September, 2014 08:45

Tags: network security, security, China hacks, government

Top Whitepapers

Twitter Feed

Featured Whitepapers