News

News Archive

  • February 20, 2007 20 Feb'07

    Cisco routers threatened by drive-by pharming

    Millions of Cisco routers in circulation could be compromised by a newly-discovered attack technique Symantec calls drive-by pharming, the networking giant warned in an advisory.

  • February 20, 2007 20 Feb'07

    Cisco to acquire Reactivity for $135 million

    One analyst says Cisco will benefit from Reactivity's policy and threat management capabilities.

  • February 20, 2007 20 Feb'07

    Microsoft confirms new IE flaw

    Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday.

  • February 20, 2007 20 Feb'07

    Google plugs dangerous flaw

    An attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it.

  • February 20, 2007 20 Feb'07

    TJX data breach worse than initially feared

    Hackers had access to a larger amount of customer data, TJX executives said in a statement.

  • February 20, 2007 20 Feb'07

    All about automation

    Automating your IT operations is a trick that creates obvious benefits. In this article, we explain how data center automation can help an entire enterprise.

  • February 19, 2007 19 Feb'07

    Sourcefire fixes Snort flaw

    Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code.

  • February 19, 2007 19 Feb'07

    When security firms merge, some users are losers

    Some users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold.

  • February 19, 2007 19 Feb'07

    Quiz: Compliance improvement -- Get better as you go forward

    A five-question multiple-choice quiz to test your understanding of the content presented by expert Richard Mackey in this lesson of SearchSecurity.com's Compliance School.

  • February 19, 2007 19 Feb'07

    What is presence?

    Presence technology makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.

  • February 19, 2007 19 Feb'07

    What is unified communications?

    Defining unified communications.

  • February 19, 2007 19 Feb'07

    What is communication-enabled-business processes (CEBP)?

    Defining communication-enabled business processes.

  • February 18, 2007 18 Feb'07

    CDP platform purchase considerations

    Busy IT organizations are employing continuous data protection (CDP) technologies to guard data on the fly, essentially eliminating the backup window and allowing granular file and system restoration -- sometimes down to the individual disk write ...

  • February 15, 2007 15 Feb'07

    News Wrap 2.0

    We've just discovered a great new application for technology that can save you an incredible amount of time, money and heartache.