News

Business applications

  • December 13, 2006 13 Dec'06

    Third zero-day found in Microsoft Word

    For the third time in a week, a zero-day flaw has been found in Microsoft Word. Users should be cautious when opening attachments from unknown sources.

  • December 13, 2006 13 Dec'06

    Eclipse adoption rate on the increase

    The adoption rate of the open source Eclipse integrated development environment has more than doubled in Europe, the Middle East and Africa, industry analysts have revealed.

  • December 12, 2006 12 Dec'06

    Symantec issues NetBackup security alert

    Symantec issues an alert and patch to vulnerabilities in NetBackup 6.0, 5.1 and 5.0.

  • December 11, 2006 11 Dec'06

    Microsoft fixes two zero-day flaws

    The December security update from Microsoft includes patches for zero-day flaws in Visual Studio and Windows Media Player, but two zero-day flaws in Word remain unfixed.

  • December 11, 2006 11 Dec'06

    IT pros look for ways to lock down IM

    Special Report: To control growing IM threats, administrators are trying to limit which programs can be used or ban the technology altogether. But that's not always possible.

  • December 11, 2006 11 Dec'06

    Vendors to crank up SaaS offerings to SMBs next year

    SMBs will outpace enterprises when it comes to IT spending in 2007 -- and vendors will delve deeper into SaaS to reach them.

  • December 11, 2006 11 Dec'06

    SIP desktop phone blends functionality, style

    VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional.

  • December 10, 2006 10 Dec'06

    Zantaz buys data classification partner Singlecast

    Email archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email takes up storage space.

  • December 10, 2006 10 Dec'06

    Microsoft suffers third zero-day in a week

    A second zero-day flaw in Word has been uncovered, Microsoft said Sunday. It's the software giant's third zero-day in a week.

  • December 10, 2006 10 Dec'06

    Storage Decisions in the wild, wild west

    Dedupe, iSCSI, backup, virtualisation and cowboys in Stetson hats -- Storage Decisions Las Vegas 2006 had it all.

  • December 07, 2006 07 Dec'06

    Dell, Microsoft tout joint NAS product

    The new NX1950 product is vastly more expensive than its counterparts from HP and NetApp, but it scales higher, supports clusters and has redundant controllers.

  • December 06, 2006 06 Dec'06

    Microsoft to fix Visual Studio, Windows flaws

    Microsoft plans to release five security updates to address vulnerabilities in Windows and a flaw in Visual Studio as part of its monthly security bulletin release cycle.

  • December 06, 2006 06 Dec'06

    Zero-day flaw found in Windows Media Player

    Attackers could exploit a new zero-day flaw in Windows Media Player to cause a denial of service or launch malicious code. The threat is Microsoft's second zero-day flaw in a week.

  • December 06, 2006 06 Dec'06

    MP3 search site pushes spyware, watchdogs say

    A Web site that gives users the ability to search for MP3s contains programs that behave like spyware, according to the Center for Democracy and Technology and StopBadware.org.

  • December 04, 2006 04 Dec'06

    IBM to acquire compliance software firm

    IBM plans to acquire Consul Risk Management Inc., a Delft, Netherlands-based firm whose software tracks non-compliant behavior of employees.

  • December 03, 2006 03 Dec'06

    Security Bytes: Phishing worm spreads through MySpace

    Round up of security news

  • November 30, 2006 30 Nov'06

    Terrorists may target financial sites

    The U.S. government is warning of an al-Qaida call for a cyberattack against online stock trading and banking Web sites

  • November 30, 2006 30 Nov'06

    Symantec blames piracy for Veritas licensing snafu

    Weekly compilation of storage news: Symantec says that software counterfeiting is throwing a wrench in tech support ; FRCP rules take effect.

  • November 30, 2006 30 Nov'06

    Oracle responds to security critics

    Security Blog Log: Oracle takes on researchers who have criticised its security procedures in recent weeks. Meanwhile, Symantec warns of new zombie malware.

  • November 29, 2006 29 Nov'06

    Video conferencing brings desktop VoIP, app sharing

    Voice, video and Web conferencing vendor Genesys adds desktop VoIP and enhanced application sharing to its collaboration lineup.

  • November 29, 2006 29 Nov'06

    Multiple flaws in Adobe Reader, Acrobat

    Multiple flaws in Adobe Reader and Acrobat could allow attackers to execute malicious commands on victims' computers.

  • November 28, 2006 28 Nov'06

    Symantec fixes NetBackup Puredisk flaw

    An unauthorised user could launch malicious code by exploiting a flaw in Symantec's Veritas NetBackup PureDisk product. But a fix is available.

  • November 22, 2006 22 Nov'06

    Zango defying FTC agreement, researchers say

    This week in Security Blog Log: Two researchers accuse Zango of unsavory adware tactics, despite the company's pledge to clean up its act.

  • November 21, 2006 21 Nov'06

    New Mac OS X flaw exposed

    A Mac OS X flaw was exposed as part of the Month of Kernel Bugs. Also, a new Web site vows to follow the lead of researchers LMH and H.D. Moore with a week of Oracle zero-days.

  • November 21, 2006 21 Nov'06

    BakBone brushes up replication software

    BakBone's NetVault Replicator version 5.0 includes automatic configuration of replication for remote sites, a capacity planning tool and a higher performance data movement engine.

  • November 21, 2006 21 Nov'06

    Telecom overspending -- thwart it!

    Research has found that telecom overspending is out of control, but a new batch of software is out there to help enterprises get a handle on their telecom billing.

  • November 13, 2006 13 Nov'06

    Trojan poses as Adobe software update

    The Trojan keylogger comes in an email that asks users to download the latest version of Adobe Reader. It then tries to steal the user's confidential information.

  • November 08, 2006 08 Nov'06

    Storage virtualization acquisitions need careful consideration

    Storage virtualization alleviates traditional storage growth problems by implementing a layer of abstraction between applications and physical storage, allowing storage to be combined and treated as a ubiquitous resource, regardless of location. ...

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 8

    Big pay for storage jobs, page 8

  • November 07, 2006 07 Nov'06

    Mozilla fixes Firefox flaws

    Attackers could exploit multiple flaws in Firefox, SeaMonkey and Thunderbird to crash machines, bypass security restrictions and launch malicious code.

  • November 06, 2006 06 Nov'06

    How to manage encryption keys

    Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed.

  • November 06, 2006 06 Nov'06

    Softek rides IBM mainframe wave, plans acquisition

    Data migration software provider Softek is planning to acquire Enigma to boost its mainframe storage software business.

  • November 05, 2006 05 Nov'06

    Microsoft eyes second zero-day threat in a week

    This time, attackers are going after a zero-day flaw in Windows, and Microsoft has released some workarounds until a patch is available.

  • November 01, 2006 01 Nov'06

    Tor network privacy could be cracked

    The Tor network is used by those who want to keep their IP addresses private. But new research shows that it's possible to compromise the system and unmask the user.

  • October 31, 2006 31 Oct'06

    Flaw found in Firefox 2.0

    Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.

  • October 30, 2006 30 Oct'06

    Instant messaging attacks rise in October

    In October alone, security firm Akonix Systems tracked 88 attacks that used instant messaging programs to spread. Attackers are also exploiting P2P programs.

  • October 26, 2006 26 Oct'06

    Achieving compliance: a real-world roadmap

    A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as essential.

  • October 26, 2006 26 Oct'06

    Security Blog Log: The never-ending PatchGuard debate

    This week, security vendor fright over the Windows Vista PatchGuard feature permeates the blogosphere. Is Microsoft the boogeyman, or just misunderstood?

  • October 26, 2006 26 Oct'06

    What storage managers are buying and why

    The second installment of the 2006 edition of Storage magazine's exclusive Purchasing Intentions Survey reveals key storage technology purchasing decisions by storage managers across all industries.

  • October 26, 2006 26 Oct'06

    IT greats: Top 10 greatest IT people

    For every world-famous name with a world famous fortune – think Bill Gates, Steve Jobs and Michael Dell – there are hundreds of other individuals who have moved the IT industry and its technology inexorably forward

  • October 25, 2006 25 Oct'06

    Sourcefire looking to go public

    The company behind the popular Snort open source IDS tool is making a bid to go public, months after its deal to be acquired by Check Point collapsed.

  • October 23, 2006 23 Oct'06

    Symantec patches AntiVirus Corporate Edition flaw

    Attackers could exploit a flaw in Symantec AntiVirus Corporate Edition and Client Security to overwrite kernel addresses, crash machines and run malicious code.

  • October 23, 2006 23 Oct'06

    Comparing VoIP vendors

    For many companies, the tough decision isn't whether to use IP telephony or not -- it's which vendor to choose. We've collected some of Carrie Higbie's tips and tricks for vendor selection, garnered from her "Ask-the-Expert" section. Carrie ...

  • October 22, 2006 22 Oct'06

    Enhanced Identity and Access Management

    From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls.

  • October 22, 2006 22 Oct'06

    Snyder On Security: An insider's guide to the essentials

    Joel Snyder, senior partner with consultancy Opus One, provides an in-depth look at information security trends and technologies.

  • October 17, 2006 17 Oct'06

    Am I out of luck if I have a "mixed" email system (e.g., Exchange and Notes)?

    That's a "real-life" situation that we run into many times when we've gone out and worked with companies. We might be called in by a company that has both a Microsoft Exchange and a Notes/Domino email system and they want to tie an archive together,...

  • October 16, 2006 16 Oct'06

    Oracle fixes 101 flaws

    Attackers could exploit 45 of the 101 flaws remotely without a username or password. Meanwhile, the new CPU offers more detail on the number of flaws patched and their severity.

  • October 15, 2006 15 Oct'06

    Sun goes back to its roots with Honeycomb user

    Stanford University is the first official Honeycomb customer; it will be using the programmable storage archive for its massive Google library project.

  • October 12, 2006 12 Oct'06

    Microsoft to fold security into Windows division

    The software giant said the move would make future Windows development efforts more efficient. The changes take effect after Microsoft releases Vista.

  • October 11, 2006 11 Oct'06

    Brief: Malicious Web site poses as Google

    A malicious Web site poses as Google's Italian site, but attempts to install malicious ActiveX controls on victim's machines and ultimately redirect them to adult content.

CIO
Security
Networking
Data Center
Data Management
Close