Malware and Vulnerabilities - News, Features, and Slideshows
A growing tendency by business units and workgroups to sign up for cloud services without asking their IT organization creates serious risks for enterprises.
By Jaikumar Vijayan | 25 August, 2014 22:59
A week after Microsoft pulled a Patch Tuesday update that crippled some Windows 7 PCs, the company has yet to provide a working fix for either the original flaw or the resulting problem.
By Gregg Keizer | 22 August, 2014 21:31
Although Microsoft has pulled a patch from Windows Update that crippled some computers, it is still pushing a truncated version of the security update that contained the flawed fix.
By Gregg Keizer | 18 August, 2014 23:34
Microsoft is quietly recommending that customers uninstall one of last week's security updates after users reported that it crippled their computers with the infamous "Blue Screen of Death."
By Gregg Keizer | 18 August, 2014 03:45
A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company's stores in June and July.
By Jaikumar Vijayan | 16 August, 2014 03:36
Microsoft has pulled out the big guns - a fear-of-God approach - to scare users into dumping Windows XP, telling them the most popular tasks done on a PC will put them in the crosshairs of cyber criminals.
By Gregg Keizer | 26 March, 2014 16:06
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.
By Jaikumar Vijayan | 14 March, 2014 10:27
As bitcoin values jumped in the last months of 2013, malware designed to steal the virtual currency exploded, security researchers from Dell SecureWorks said this week.
By Gregg Keizer | 28 February, 2014 20:36
Target's acknowledgement Friday that personal data of 70 million people, not 40 million as previously thought, may have been exposed to hackers in a recent data breach raises new questions about the incident and how it could affect victims.
By Jaikumar Vijayan | 10 January, 2014 17:13
Whitepapers about Malware and Vulnerabilities
Cyberattacks have evolved to become much more complex, however the core techniques employed by malware are usually recycled and largely unchanged. <p> Find out how these targeted attacks affect companies in real world cases and why legacy solutions that focus on detection are insufficient to protect secure enterprise data. Included are also 10 preventative measures you can take to prevent a corporate security breach.
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCPython Web Developer - DevOPS EnvironmentVIC
- FTJava or Ruby Web DeveloperVIC
- FTNetwork Engineer | NV2 clearance | Military jets, subs, bases and networksACT
- CCIBM ESB Developer (Junior to mid level role)NSW
- CCTeradata DeveloperNSW
- FTWeb Analytics Specialist - TechnicalNSW
- CCLync/Skype EngineerNSW
- FTSenior Java DeveloperNSW
- CCEXCEL Guru / Data AdministratorNSW
- CCiOS Developer - New AppNSW
- FTAndroid DeveloperNSW
- CCContract Analyst Programmer (JAVA/Oracle/UNIX) 160203/AP/381Asia
- FTWintel EngineerACT
- FTNetwork Engineer | NV2 clearance | Defence projects | Immediate interviewACT
- CCIT Security EngineerNSW
- CCSenior Information Security SpecialistNSW
- FTSenior Oracle DBANSW
- CCContract System Analyst (MSSQL/.Net/Mobile App) 160122/SA/vhaAsia
- FTSenior Mobile Developer - IOSNSW
- FTLead Software Developer- Complex Tax & Superannuation SolutionsNSW
- FTManual Software TesterNSW
- CCVMWare Horizon View 6.1 roll out & IT support | Short contract | Macquarie ParkNSW
- CCAD and FIM EngineerNSW
- CCSenior Test AnalystSA
- CCJava Development EngineerNSW
Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations. Included are four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.
- Gaming on Linux, Steam machines set to soar with DirectX competitor Vulkan
- Most enterprises plan to boost cloud use this year
- Google didn't abuse its position in Streetmap case, UK court rules
- GitHub apologizes for ignoring community concerns
- New Chromebook won't break with 365-pound person standing on it
- Nasdaq to use blockchain to record shareholder votes
- Pwn2Own contest puts $75,000 bounty on VMware Workstation bypass
- Intel SSDs may get speed, capacity boost with new Micron chips
- Five sue Apple over Error 53 and bricked iPhones
- AT&T to run field trials of 5G wireless in Austin this year
- Apple's iPhone sued for infringement of touch feedback patents
- Need data-science skills? Now your team can learn together
- Hackers of two Ukrainian utilities probably hit mining and railroad targets, too
- Qualcomm hopes a gradual approach to server market will pay dividends
- VMware’s new management tools are hybrid, hybrid, hybrid