News

News

  • September 07, 2006 07 Sep'06

    Mobile workers push for smartphones

    Road warriors may prefer smartphones over laptops and PDAs, but equipping your entire mobile workforce with this nifty tool may not be such a great idea.

  • September 07, 2006 07 Sep'06

    SMS phishing is here

    Phishing attacks are no longer limited to email. Recently, researchers uncovered phishing scams using SMS, and mobile experts say enterprises should be wary of these so-called SMiShing scams.

  • August 31, 2006 31 Aug'06

    Online crime as ugly as ever

    At this year's Conference on Email and Antispam, one expert said that despite the increasing complexity of online scams and attacks, digital criminals are less about the technology and more about the crime.

  • August 28, 2006 28 Aug'06

    Symantec peddles enterprise vault tool

    The new Enterprise Vault software contains features developed because of a recent update to the Federal Rules of Civil Procedure.

  • August 22, 2006 22 Aug'06

    McAfee sued for patent infringement

    DeepNines claims McAfee is marking and selling products based on the DeepNines patent for the Security Edge Platform, a unified threat management product that integrates several tools into a single device.

  • Sponsored News

    • Discovering the Business Value of Streaming Analytics

      With streaming analytics you can solve business problems in new ways and seize new revenue opportunities. You can reduce costs and increase efficiency while improving the safety of employees and the security of assets and intellectual property. See More

    • Transform Your Data to Transform Your Business

      B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More

    • Three Use Cases for Interactive Data Discovery and Predictive Analytics

      Interactive data discovery and predictive analytics technologies allow business users and analysts to identify important trends and relationships in data sets and drill down into questions from any angle. They also allow business users to collaborate with specialists to create, refine and select the best predictive models. See More

    • Six Steps to Modernizing Your B2B Architecture

      This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More

    View All Sponsored News
  • August 17, 2006 17 Aug'06

    BlackBerry vulnerability, mobile viruses are real threats

    At this month's Black Hat conference, a presentation centered around BBProxy, a hacking program that can take advantage of the trust relationship between a BlackBerry and an enterprise's internal server to hijack network connections.

    That, ...

  • August 17, 2006 17 Aug'06

    Antivirus researcher Gullotto leaves Symantec for Microsoft

    One of the industry's most knowledgeable AV gurus has left Symantec for Microsoft. Vinny Gullotto will be charged with forming an AV research unit to rival Symantec and McAfee.

  • August 16, 2006 16 Aug'06

    Clearing the confusion around circular logging

    Because Microsoft's circular logging recommendations have changed over the years based on Exchange Server version changes, there is a lot of contradictory information out there on the topic. This article explains what circular logging is and the ...

  • August 08, 2006 08 Aug'06

    McAfee products vulnerable to code execution flaw

    VirusScan, Personal Firewall Plus, SpamKiller and other McAfee products are reportedly vulnerable to an unspecified remote code execution flaw.

  • August 04, 2006 04 Aug'06

    Image-based spam scams on the rise

    By using images instead of text, spammers are invading your inbox with a lot more than offensive language. Not only are the emails vulgar and invasive, but they're also creating huge storage and bandwidth problems.

  • August 03, 2006 03 Aug'06

    BlackBerry hosted server feeds SMB mobile email hunger

    BlackBerry maker RIM announced a hosted mobile email server, but some experts are wondering whether it makes sense to have hosted mobile email with an on-site email server.

  • August 03, 2006 03 Aug'06

    Mobile security starts with policy

    Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy.

  • August 01, 2006 01 Aug'06

    Part 2: An introduction to DNS records

    Tutorial: A primer on DNS and MX records, part 2: An introduction to DNS records

  • August 01, 2006 01 Aug'06

    Part 1: How DNS works

    Tuturial: A primer on DNS and MX records, part 1: How DNS works

  • August 01, 2006 01 Aug'06

    Part 4: How to set up a Host record

    Tutorial: A primer on DNS and MX records, part 4: How to set up a Host record

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close