1. UK SMB spending on managed security reached $42 mln in 2007

    Date: 01/15/08     Keywords: no keywords

    Small and medium businesses (SMBs, or companies with up to 999 employees) in the United Kingdom spent $12 bln on IT services in 2007, up some 8% over 2006. Up to 29% of the over $40 bln in IT and telecom spending by UK SMBs went towards IT services. In...

    Source: http://blogs.zdnet.com/ITFacts/?p=13647

  2. Symantec: Trojan has 400 banks on its hitlist

    Date: 01/14/08     Keywords: no keywords

    A Trojan dubbed Silentbanker targets more than 400 banks including the household names in the U.S. and other financial institutions abroad and hangs in the background to intercept transactions with two-factor authentication, according to researchers at Symantec. In a day full of the usual Trojan attacks (they...

    Source: http://blogs.zdnet.com/security/?p=806

  3. Cyber Defcon 4

    Date: 01/14/08     Keywords: no keywords

    I am preparing my next road show pitch. My past presentations have followed a pattern. There is one slide I have been using for seven years now, ever since I joined Gartner as an analyst as a matter of fact. It is the Threat Hierarchy slide. It lists...

    Source: http://blogs.zdnet.com/threatchaos/?p=503

  4. Open-source security moves to next step

    Date: 01/11/08     Keywords: software, security

    Eleven projects are certified as secure in government-backed initiative led by source code analysis specialist Coverity. Source code analysis expert Coverity has found and helped fix more than 7,500 security flaws in open-source software, and published a list of the 11 open-source projects working fastest to sort them...

    Source: http://news.zdnet.com/2100-1009_22-6225700.html

  5. Week in review: Gates' farewell to CES troops

    Date: 01/11/08     Keywords: no keywords

    Bill Gates gives his "last keynote" at CES and tech is no front-runner in New Hampshire. Also: The decline of DRM. Bill Gates, one of the most influential people in tech for the past three decades, delivered what he called his "last keynote" at the Consumer Electronics...

    Source: http://news.zdnet.com/2100-9595_22-6225633.html

  6. Unbreakable: PKI is alive and kicking

    Date: 01/10/08     Keywords: technology, security

    Many organizations are starting to deploy certificates to secure critical pieces of business including e-mail, mobile access, and digital signaturs. The SaaS model is key factor for PKI comeback says ChosenSecurity's John Adams Commentary--Today, there is a wide range of technology, products and solutions for securing an enterpris'’s...

    Source: http://news.zdnet.com/2424-9595_22-182915.html

  7. Researcher finds flaw in SAP's MaxDB

    Date: 01/10/08     Keywords: database, security, linux

    A security researcher has found a remote command execution exploit in SAP's MaxDB database on the Windows, Linux and Solaris platforms. Researcher Luigi Auriemma published the flaw in MaxDB versions 7.6.03 build 007 and below. MaxDB (all ZDNet resources and SAP wiki) is an SAP-certified open source...

    Source: http://blogs.zdnet.com/security/?p=795

  8. New York launches antitrust probe into Intel

    Date: 01/10/08     Keywords: no keywords

    State attorney general says formal investigation will focus on whether Intel coerced customers to exclude AMD processors. The office of New York Attorney General Andrew Cuomo on Thursday said it launched a formal investigation into Intel to determine whether the world's biggest chipmaker violated state and U.S. antitrust...

    Source: http://news.zdnet.com/2100-9584_22-6225501.html

  9. Storm worm goes phishing

    Date: 01/10/08     Keywords: security

    The dreaded Storm worm is now being used for phishing scams, according to security researchers. F-Secure outlined a phishing scam involving the Storm worm (all resources) on i-halifax.com and noted that the site's IP address changed every second or so--it was hosted within a botnet. ...

    Source: http://blogs.zdnet.com/security/?p=792

  10. Microsoft delivers two patches for three vulnerabilities; Plugs Vista hole

    Date: 01/08/08     Keywords: microsoft

    Microsoft on Tuesday delivered one "critical" addressing two vulnerabilities in XP and Vista and one "important" vulnerability in Windows 2000, XP and Windows Server 2003. The critical patch resolves two vulnerabilities (CVE-2007-0069 and CVE-2007-0066) reported by IBM ISS X-Force. The vulnerability, which involved TCP/IP processing, was critical...

    Source: http://blogs.zdnet.com/security/?p=790

  11. First iPhone Trojan in the wild

    Date: 01/08/08     Keywords: security

    The long-awaited first Trojan for Apple's iPhone arrived and left its shoe print. When installed the Trojan displays the word "shoes" on the screen. The first warnings about the Trojan were posted on Saturday on the iPhone modification forum ModMyiFone.com, said security vendor F-Secure. When installed, the Trojan appeared...

    Source: http://news.zdnet.com/2424-9595_22-182554.html

  12. Data theft, the armed variety

    Date: 01/08/08     Keywords: technology, web, hosting

    Computerworld chronicles the tale of Web hosting firm C I Host Inc. and details how its data center was robbed. Meanwhile, the technology manager working the graveyard shift was held hostage as the robbers stole computer equipment. The story's point can't be more clear: Data centers aren't...

    Source: http://blogs.zdnet.com/security/?p=789

  13. Lawyers circle Sears over privacy

    Date: 01/07/08     Keywords: no keywords

    Sears may have taken down a feature that allowed you to see anyone's purchase history, but not fast enough to keep the lawyers at bay. On Friday, KamberEdelson filed a class action complaint alleging that Sears ManageMyHome.com site violates the Illinois Consumer Fraud Act. The suit, first...

    Source: http://blogs.zdnet.com/security/?p=787

  14. Sony BMG to drop copy protection for downloads

    Date: 01/07/08     Keywords: software

    Hoping to boost digital sales, Sony BMG finally will join EMI, Warner Music Group and Universal Music Group in dropping DRM. Sony BMG Music Entertainment, the world's second-largest music company, will this month become the last of the big four majors to drop copy protection software on music...

    Source: http://news.zdnet.com/2100-9588_22-6224807.html

  15. Attack journalism: an iPhone example

    Date: 01/07/08     Keywords: no keywords

    Here's a comment from cnet contributor ripragged in response to a Macalope blog entry responding to an article about DRM - but entirely applicable in a different context: the essentially unanimous rejection of the iPhone by the paid IT analyst community: I'm trying...

    Source: http://blogs.zdnet.com/Murphy/?p=1039

  16. Napster moves to MP3-only music download format

    Date: 01/07/08     Keywords: no keywords

    Digital music retailer says it will start selling downloads in the MP3 format in the latest blow to copy protection for songs bought online. Napster, one of the largest digital music retailers, said Monday it would start selling downloads in the MP3 format from the second quarter...

    Source: http://news.zdnet.com/2100-9588_22-6224778.html

  17. Office 2003 SP3 and CoralDraw .CDR files

    Date: 01/05/08     Keywords: microsoft

    Since I do have a few CoralDraw .CDR files hanging about the place, and have Office 2003 installed on a couple of system, I was interested in getting to the bottom of why Microsoft blocked access to .CDR files with Office 2003 SP3. For some answers I contacted Microsoft, and...

    Source: http://blogs.zdnet.com/hardware/?p=1116

  18. Intel to respond to EU antitrust charges Monday

    Date: 01/04/08     Keywords: no keywords

    Chipmaker gets a few more days to file response to alleged illegal attempt to drive AMD out of market, the Commission says. Chipmaker Intel has been granted a further short extension to respond to antitrust charges leveled by the European Commission, an Intel representative said Friday. The response...

    Source: http://news.zdnet.com/2110-9595_22-6224675.html

  19. The easy way to avoid a Wi-Fi virus

    Date: 01/04/08     Keywords: virus

    It's flu season—for you and your wireless router. A study by Indiana University proves that a virus can quickly spread among unsecured or WEP-encrypted routers in densely populated urban areas. But networks secured by the WPA protocol were impenetrable, and that gives you one more good reason to really...

    Source: http://blogs.zdnet.com/soho-networking/?p=111

  20. U.S. indicts 'spam king' in stock fraud scheme

    Date: 01/04/08     Keywords: spam

    A federal grand jury indicts a Michigan man dubbed the "spam king," and 10 others, in an international illegal bulk e-mailing and stock fraud scheme. A federal grand jury in Detroit has indicted a Michigan man dubbed the "spam king," and 10 others, in an international illegal...

    Source: http://news.zdnet.com/2100-9588_22-6224568.html

Previous page  ||  Next page


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home