Search

IT News

iPhone 6 rumor rollup for the week ending Nov. 8

As the weather in North America chills, the temperature of the iOSphere is increasing, as many fixate on June 2014 as the date for iPhone 6, the "real" iPhone instead of, you know, the disappointing iPhone 5 and the 5S that looks so much like it....

13.11.2013

OS X Mavericks corralled by JAMF’s new Apple management suite

For decades, Microsoft has ruled the enterprise end user space, but as "mobility" has expanded to include smartphones and tablets, Apple is now a leading vendor for enterprise IT. And the success of iOS devices is sparking a wider enterprise interest in OS X computers....

13.11.2013

Georgia Tech warns of emerging threats in cloud, mobile

Companies will face next year emerging threats in cloud data storage that will demand security measures that go far beyond what is offered by service providers, a university report says....

13.11.2013

Best practices for safely moving data in and out of the cloud

As everyone knows, cloud provider Nirvanix recently fell apart, declaring bankruptcy and leaving its customers in the lurch. Nirvanix gave enterprises less than a month to move their data to a new home. To avoid the fate of those customers, follow these best practices for safely moving data in and out of the cloud....

13.11.2013

Banking malware infections rise to highest level since 2002

Malicious software aimed at stealing online banking credentials surged in the third quarter of this year to a level not seen since 2002, according to a new report from Trend Micro....

13.11.2013

Arbor Networks introduces cloud-based anti-DDoS service

Arbor Networks today introduced its first cloud-based distributed denial-of-service (DDoS) mitigation service to protect enterprises against large-scale attacks intended to swallow up available bandwidth or knock application servers offline....

13.11.2013

Start-up Adallom takes on SaaS security monitoring/auditing

Start-up Adallom today introduced a cloud-based offering intended to help enterprises better monitor, audit and control use of software-as-a-service (SaaS) applications by employees....

13.11.2013

Researchers reveal IE zero-days after hackers set 'watering hole' traps

Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer which have been exploited by attackers in an unusual "watering hole" campaign launched from a U.S.-based website that specializes in domestic and international security policy....

13.11.2013

IT experience leads to entrepreneurship for Aussie duo

The startup culture largely rejects the traditional career path, particularly in the tech world. Many entrepreneurs in Silicon Valley launched their startups while still in college, or worked for a startup immediately after college, adopting an entrepreneurial mentality early on that allowed them to bypass the hierarchy and bureaucracy that comes with working for a large company....

13.11.2013

Google wants tattoo to act as smartphone microphone

Google already has Google Glass, but now it's taking the wearable technology concept a big step further: It's developing an electronic skin tattoo for the throat that can act as a microphone for a smartphone, tablet or other device....

13.11.2013

    SERVICES

  • - Consultancy and technical support
  • - Marketing support
  • - Training
eXTReMe Tracker