News

News Archive

  • September 24, 2007 24 Sep'07

    PCI council adds Pin security to remit

    The PCI Security Standards Council has added Pin Entry Device (PED) security technology to its payments industry testing portfolio to streamline standardisation.

  • September 20, 2007 20 Sep'07

    Australians more tech-aware

    Telecommunications and the internet are becoming increasingly embedded in the lives of Australians, says an ACMA survey.

  • September 20, 2007 20 Sep'07

    NetScout acquires Network General

    NetScout will acquire Network General, creating a one-stop shop for network management and monitoring tools.

  • September 20, 2007 20 Sep'07

    Unified communications an 'uphill battle' for Microsoft

    Unified communications is going to be a tough sell for Microsoft, which is looking to eliminate the PBX and go all software.

  • September 20, 2007 20 Sep'07

    Wireless troubleshooting

    Wireless network troubleshooting basics are discussed in this guide.

  • September 19, 2007 19 Sep'07

    End-to-end network management enables reliable VoIP, unified communications

    Monitoring voice quality, service availability, and security conditions are discussed in this Q & A with Gurmeet Lamba of Clarus Systems.

  • September 19, 2007 19 Sep'07

    802.11 protocols

    802.11 wireless protocols and deployment basics are discussed in this guide.

  • September 18, 2007 18 Sep'07

    Cisco to acquire Cognio

    Cisco will acquire wireless spectrum analysis and management vendor Cognio in a deal that will give Cisco a leg-up on wireless and mobility.

  • September 18, 2007 18 Sep'07

    Nokia to acquire mobile advertiser

    Nokia has announced it has entered into an agreement to acquire mobile advertising and marketing company Enpocket for an undisclosed amount.

  • September 18, 2007 18 Sep'07

    Wireless security

    Wireless security and polices are covered in this guide.

  • September 17, 2007 17 Sep'07

    Wireless network deployment and management

    Wireless network deployment and management are discussed in this guide.

  • September 17, 2007 17 Sep'07

    Wireless access points

    The basics of wireless access point (AP) as well as configuration and placement are covered in this guide.

  • September 16, 2007 16 Sep'07

    3PAR adds tiered storage management tool

    The new version of the System Reporter management tool for 3PAR's high-end arrays now includes monitoring for tiered storage environments.

  • September 16, 2007 16 Sep'07

    Storage Decisions Session Downloads: Data Protection and Backup Track (NYC 2007)

    Making the backup process seamless and reliable is critical. This track covers the staple backup technologies such as disk and tape, but also has an eye on the litany of new technologies set to drastically alter the data protection landscape. ...

  • September 16, 2007 16 Sep'07

    Communications-as-a-service taking hold

    Communications-as-a-service is taking hold worldwide as a viable hosted IP telephony system.

  • September 16, 2007 16 Sep'07

    NAC switches, appliances help track users, malware

    Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market sorts itself out.

  • September 16, 2007 16 Sep'07

    Wireless protocols learning guide

    Wireless technologies including 802.11, WLAN and Wi-Fi defined in this guide.

  • September 16, 2007 16 Sep'07

    Cisco IP Communications Express: CallManager Express with Cisco Unity Express

    Creating an intercom network between IP phones that support speakerphone capabilities is a relatively painless process when using Cisco CallManager Express.

  • September 10, 2007 10 Sep'07

    Product Roundup: E-discovery

    A look at some of the suppliers and products that make up the e-discovery market.

  • September 09, 2007 09 Sep'07

    VoIP, unified communications prompt new technologies, threats

    Wireless voice servers and handsets, VoIP and unified communications threats, and licensing agreements constitute recent changes in the VoIP market.

  • September 09, 2007 09 Sep'07

    NetApp, HDS tout scaled-down disk arrays

    New offerings are meant to take advantage of storage growth in the midmarket, but experts say the products will still probably appeal most to existing high-end users.

  • September 09, 2007 09 Sep'07

    Virtual appliance lets users convert DAS to iSCSI San

    LeftHand Networks has released an edition of its SaniQ iSCSI San software that will convert locally attached disc to networked storage.

  • September 07, 2007 07 Sep'07

    Microsoft update to patch critical Windows flaw

    Microsoft plans to patch a critical flaw in Windows and plug holes in MSN Messenger, Visual Studio, and Windows services for Unix.

  • September 07, 2007 07 Sep'07

    Government warns of dangerous QuickBooks Online flaw

    Attackers could exploit two flaws in the popular Intuit QuickBooks Online Edition to cause buffer overflows and download or upload files in arbitrary locations, US-CERT warned.

  • September 07, 2007 07 Sep'07

    Cybercriminals employ toolkits in rising numbers to steal data

    The market is increasing for crimeware toolkits that help cybercriminals avoid detection and exploit flaws, according to new research from security vendor, Finjan.

  • September 06, 2007 06 Sep'07

    Learn all about SATA

    This handbook offers three related SATA tips which compare SATA to SAS and SCSI and provides advice on striking the right balance between them.

  • September 06, 2007 06 Sep'07

    IDC: High-end storage stalls in second quarter

    IDC reports a lull in high-end enterprise spending in its quarterly disk tracker, with new growth lower in the market; Seagate plans encrypted 1 TB disk drive for PCs.

  • September 06, 2007 06 Sep'07

    Citrix adds Web security with acquisition

    Citrix Systems Inc. said it acquired XML security vendor QuickTree for its compiler technology and Java API for XML processing.

  • September 06, 2007 06 Sep'07

    Data security breach at Pfizer affects thousands

    A Pfizer employee removed files exposing 34,000 people to potential identity fraud, according to the company. It was the third data breach at the company in three months.

  • September 05, 2007 05 Sep'07

    NAC switches, appliances help track users, malware

    Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market including Cisco NAC and Microsoft NAP sorts itself out.

  • September 05, 2007 05 Sep'07

    Firefox security issues persist despite update

    Despite Mozilla's recent Firefox security update, researchers say there's another way attackers could exploit the browser for malicious purposes.

  • September 05, 2007 05 Sep'07

    Critical flaw discovered in IBM DB2

    IBM's DB2 database management system contains a flaw that could be exploited remotely by an attacker to take control of a system.

  • September 04, 2007 04 Sep'07

    IT cheat sheets for all

    They may seem like no-brainers to you, but some of your IT tricks and workarounds look magical to your peers. We've collected our favorite IT cheat sheets on topics ranging from AS/400 to HTML and Outlook so everyone can look like a whiz.

  • September 04, 2007 04 Sep'07

    NetApp files suit against Sun over ZFS

    NetApp says Sun's ZFS violates its patents and seeks an injunction against its distribution, potentially putting Sun's storage business at risk. Update 9/6/07: Sun counterattacks.

  • September 04, 2007 04 Sep'07

    Cisco goes next generation with 802.11n

    Cisco today released 802.11n WLAN gear, as wireless experts predict the technology will soon kill the need for wired Ethernet LAN access.

  • September 02, 2007 02 Sep'07

    Wireless network security: Controlling secondary connections

    Secondary connections are the latest threat to corporate wireless networks and require more than password protection to remain secured.

  • September 02, 2007 02 Sep'07

    Now the dust has settled on pornography filtering...

    Andrew Collins looks at the controversial topic of Internet porn filtering in Australia, now that the federal government has enacted its hotly debated plans.

  • August 31, 2007 31 Aug'07

    Cisco issues CallManager security update

    Security flaws in Cisco CallManager and Unified Communications Manager could be exploited for cross-site scripting and SQL injection attacks, but a security update is available.

  • August 31, 2007 31 Aug'07

    Suncorp reveals five-year VoIP plan

    Financial services group Suncorp explains its plans to IP-enable its operations to Adam Turner.

  • August 30, 2007 30 Aug'07

    Network access control vendors: Attraction vs. retention

    Network access control (NAC) vendors were evaluated based on attractiveness and customer retention in a recent survey by Current Analysis.

  • August 30, 2007 30 Aug'07

    Flaw found in MSN Messenger

    Attackers could exploit a flaw in MSN Messenger to run malicious code on targeted machines, according to Danish vulnerability clearinghouse Secunia.

  • August 30, 2007 30 Aug'07

    Critical flaw found in Oracle developer tool

    A popular tool used by Oracle developers contains a critical flaw that could be used by an attacker to compromise a system.

  • August 29, 2007 29 Aug'07

    IMS, FMC on telecom carrier roadmaps

    IMS and FMC are top of the to-do lists of service providers trying to differentiate themselves from the competition, according to an Infonetics Research study.

  • August 29, 2007 29 Aug'07

    Rootkit found in older Sony USB device

    F-Secure says it discovered rootkit technology in Sony's Micro Vault USM-F fingerprint reader software. The find comes two years after controversy over Sony's DRM technology.

  • August 28, 2007 28 Aug'07

    Unified communications slow to change U.S. work culture

    Unified communications implementation is still high, but many enterprises have yet to allow users all its advantages.

  • August 28, 2007 28 Aug'07

    Data archives overview

    When a file is lost due to user error, or data is corrupted because of system problems, the affected data can be restored from a backup. An archive is different from a backup because the data may not be used for months, even years, but must be ...

  • August 28, 2007 28 Aug'07

    VoIP, unified communications study reveals challenges

    VoIP and unified communications deployments can affect other applications. A study by Network General highlighted some challenges introduced by convergence.

  • August 28, 2007 28 Aug'07

    VoIP, unified communications study reveals challenges

    VoIP and unified communications deployments can affect other applications. A study by Network General highlighted some challenges introduced by convergence.

  • August 28, 2007 28 Aug'07

    SANS: Attackers may be attempting Trend Micro exploits

    The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Trend Micro products to hijack computer systems.

  • August 27, 2007 27 Aug'07

    VoIP, unified communications study reveals challenges

    VoIP and unified communications deployments can affect other applications. A recent study by Network General highlighted some of the challenges introduced by convergence.