Search

IT News

All major browsers fall during second day at Pwn2Own hacking contest

Security researchers demonstrated zero-day exploits against Google Chrome, Microsoft Internet Explorer, Apple Safari, Mozilla Firefox and Adobe Flash Player during the second day of the Pwn2Own hacking competition Thursday, racking up total prizes of US$450,000....

17.03.2014

8 ways to improve wired network security

We sometimes focus more on the wireless side of the network when it comes to security because Wi-Fi has no physical fences. After all, a war-driver can detect your SSID and launch an attack while sitting out in the parking lot....

17.03.2014

Windows XP can put SOX, HIPAA, credit card security-compliance at risk

When Microsoft stops supporting Windows XP next month businesses that have to comply with payment card industry (PCI) data security standards as well as health care and financial standards may find themselves out of compliance unless they call in some creative fixes, experts say....

17.03.2014

Cloud Wars Heating Up in 2014

Google, Amazon and Microsoft have all made strategic moves to gain cloud market share -- and the 'cloud wars' are only getting started....

16.03.2014

More networking news,features and forums

...

16.03.2014

How VMware wants to reinvent the SAN

VMware has released a virtual Storage Area Network (Virtual SAN), which the company says will usher in a new era of policy-driven and virtual machine-centric storage provisioning....

16.03.2014

Techies see future where Web flows like electricity

As the World Wide Web celebrates its 25th year Wednesday, top techies are looking ahead to the next 25 years when they say the Web will be woven more deeply, and seamlessly, into our lives....

16.03.2014

Can anti-virus technology morph into breach detection systems?

Anti-virus software is still often considered a "checkbox" item for enterprise deployments, especially on Microsoft Windows, but over the decades, anti-virus software changed to do far more than just signature-based virus blocking. Today, the question is whether the type of anti-malware product that evolved from virus checking can transform again to be a part of a "breach detection system,"  or BDS...

16.03.2014

Memory rivals brace for legal battle after alleged trade secrets theft

A former SK Hynix employee is at the center of a brewing legal battle between top flash memory rivals after allegedly stealing trade secrets....

16.03.2014

FCC approves AT&T's purchase of Leap Wireless

The U.S. Federal Communications Commission has approved AT&T's US$1.2 billion acquisition of competitor Leap Wireless, which sells prepaid mobile service under the Cricket brand....

16.03.2014

    SERVICES

  • - Consultancy and technical support
  • - Marketing support
  • - Training
eXTReMe Tracker