Malware and Vulnerabilities - News, Features, and Slideshows
A growing tendency by business units and workgroups to sign up for cloud services without asking their IT organization creates serious risks for enterprises.
By Jaikumar Vijayan | 25 August, 2014 22:59
A week after Microsoft pulled a Patch Tuesday update that crippled some Windows 7 PCs, the company has yet to provide a working fix for either the original flaw or the resulting problem.
By Gregg Keizer | 22 August, 2014 21:31
Although Microsoft has pulled a patch from Windows Update that crippled some computers, it is still pushing a truncated version of the security update that contained the flawed fix.
By Gregg Keizer | 18 August, 2014 23:34
Microsoft is quietly recommending that customers uninstall one of last week's security updates after users reported that it crippled their computers with the infamous "Blue Screen of Death."
By Gregg Keizer | 18 August, 2014 03:45
A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company's stores in June and July.
By Jaikumar Vijayan | 16 August, 2014 03:36
Microsoft has pulled out the big guns - a fear-of-God approach - to scare users into dumping Windows XP, telling them the most popular tasks done on a PC will put them in the crosshairs of cyber criminals.
By Gregg Keizer | 26 March, 2014 16:06
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.
By Jaikumar Vijayan | 14 March, 2014 10:27
As bitcoin values jumped in the last months of 2013, malware designed to steal the virtual currency exploded, security researchers from Dell SecureWorks said this week.
By Gregg Keizer | 28 February, 2014 20:36
Target's acknowledgement Friday that personal data of 70 million people, not 40 million as previously thought, may have been exposed to hackers in a recent data breach raises new questions about the incident and how it could affect victims.
By Jaikumar Vijayan | 10 January, 2014 17:13
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTAcquisition Marketing ExceutiveNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTStudio Design ManagerVIC
- FTProgram Manager - Integration & SolutionsNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
A growing number of organisations are using off the shelf technologies to stretch application processing and data access for continuous application and availability. This paper describes how deployment models for applications work. Enterprises are consolidating high availability and data recovery practices and technologies to achieve continuous availability that provides users with uninterrupted access to data and applications The right solution provides data coherency across distance for simultaneous access to the same data in multiple locations Organisations need to be able to trust that the data and applications it depends on will continues to be available and operate, through both planned and unplanned outages
- Pressure mounts in Europe for strict net neutrality
- Use Uber? Snapchat? Google Maps? Now Twitter knows
- Opera pitches all-you-can-eat app stores to mobile operators
- Apple-IBM products in November? Not quite
- Amazon's Fire sale: Phone is now just $199 unlocked
- PoS malware also targeting ticket vending machines and electronic kiosks
- Oracle, Oregon tussle over whether federal court should hear Cover Oregon case
- First robot, networked tablets head to West Africa to fight Ebola
- HP's former CEO Carly Fiorina explores GOP presidential run
- 5 ways to tell a cloud poser from a cloud pro
- EU wants Google to apply 'right to be forgotten' delistings to global .com domain
- What to consider when negotiating a hybrid cloud SLA
- US lawmakers to Europe: Don't break up Google
- Mozilla unveils search tool tweaks in next week's Firefox 34
- Hacking Team surveillance malware masquerades as legitimate bookmark manager