News

News Archive

  • February 25, 2007 25 Feb'07

    Gartner: Quad-core slowed 2006 server sales

    New Gartner data suggests that quad-core servers are not exciting users.

  • February 22, 2007 22 Feb'07

    Google offers 10 GB inbox

    The search engine giant is offering an email application on a subscription basis with five times the storage capacity of the free version.

  • February 21, 2007 21 Feb'07

    Cisco warns of IP phone flaws

    Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday.

  • February 20, 2007 20 Feb'07

    Cisco routers threatened by drive-by pharming

    Millions of Cisco routers in circulation could be compromised by a newly-discovered attack technique Symantec calls drive-by pharming, the networking giant warned in an advisory.

  • February 20, 2007 20 Feb'07

    Cisco to acquire Reactivity for $135 million

    One analyst says Cisco will benefit from Reactivity's policy and threat management capabilities.

  • February 20, 2007 20 Feb'07

    Microsoft confirms new IE flaw

    Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday.

  • February 20, 2007 20 Feb'07

    Google plugs dangerous flaw

    An attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it.

  • February 20, 2007 20 Feb'07

    TJX data breach worse than initially feared

    Hackers had access to a larger amount of customer data, TJX executives said in a statement.

  • February 20, 2007 20 Feb'07

    All about automation

    Automating your IT operations is a trick that creates obvious benefits. In this article, we explain how data center automation can help an entire enterprise.

  • February 19, 2007 19 Feb'07

    Sourcefire fixes Snort flaw

    Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code.

  • February 19, 2007 19 Feb'07

    When security firms merge, some users are losers

    Some users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold.

  • February 19, 2007 19 Feb'07

    Quiz: Compliance improvement -- Get better as you go forward

    A five-question multiple-choice quiz to test your understanding of the content presented by expert Richard Mackey in this lesson of SearchSecurity.com's Compliance School.

  • February 19, 2007 19 Feb'07

    What is presence?

    Presence technology makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.

  • February 19, 2007 19 Feb'07

    What is unified communications?

    Defining unified communications.