News

News

  • September 07, 2006 07 Sep'06

    Mobile workers push for smartphones

    Road warriors may prefer smartphones over laptops and PDAs, but equipping your entire mobile workforce with this nifty tool may not be such a great idea.

  • September 07, 2006 07 Sep'06

    SMS phishing is here

    Phishing attacks are no longer limited to email. Recently, researchers uncovered phishing scams using SMS, and mobile experts say enterprises should be wary of these so-called SMiShing scams.

  • August 31, 2006 31 Aug'06

    Online crime as ugly as ever

    At this year's Conference on Email and Antispam, one expert said that despite the increasing complexity of online scams and attacks, digital criminals are less about the technology and more about the crime.

  • August 28, 2006 28 Aug'06

    Symantec peddles enterprise vault tool

    The new Enterprise Vault software contains features developed because of a recent update to the Federal Rules of Civil Procedure.

  • August 22, 2006 22 Aug'06

    McAfee sued for patent infringement

    DeepNines claims McAfee is marking and selling products based on the DeepNines patent for the Security Edge Platform, a unified threat management product that integrates several tools into a single device.

  • Sponsored News

    • Transform Your Data to Transform Your Business

      B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More

    • Six Steps to Modernizing Your B2B Architecture

      This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More

    • Improve Security with Managed File Transfer

      File transfer is one of the vital functions of B2B collaboration. Organizations require safe, secure and compliant file transfer in order to drive revenue, satisfy customer requirements and enable effective collaboration across the entire B2B value chain. See More

    • Leveraging Cloud Models to Simplify B2B Collaboration

      Reducing complexity in managing business-to-business integration is one of the primary challenges for IT teams. With the growth of the Internet of Things (IoT), social networking and big data analytics, the need to simplify partner interactions and automate processes is becoming more critical than ever. By simplifying B2B collaboration, IT can reduce costs, enhance partner and customer experiences, and leverage real-time visibility and analytics to drive business innovation. See More

    View All Sponsored News
  • August 17, 2006 17 Aug'06

    BlackBerry vulnerability, mobile viruses are real threats

    At this month's Black Hat conference, a presentation centered around BBProxy, a hacking program that can take advantage of the trust relationship between a BlackBerry and an enterprise's internal server to hijack network connections.

    That, ...

  • August 17, 2006 17 Aug'06

    Antivirus researcher Gullotto leaves Symantec for Microsoft

    One of the industry's most knowledgeable AV gurus has left Symantec for Microsoft. Vinny Gullotto will be charged with forming an AV research unit to rival Symantec and McAfee.

  • August 16, 2006 16 Aug'06

    Clearing the confusion around circular logging

    Because Microsoft's circular logging recommendations have changed over the years based on Exchange Server version changes, there is a lot of contradictory information out there on the topic. This article explains what circular logging is and the ...

  • August 08, 2006 08 Aug'06

    McAfee products vulnerable to code execution flaw

    VirusScan, Personal Firewall Plus, SpamKiller and other McAfee products are reportedly vulnerable to an unspecified remote code execution flaw.

  • August 04, 2006 04 Aug'06

    Image-based spam scams on the rise

    By using images instead of text, spammers are invading your inbox with a lot more than offensive language. Not only are the emails vulgar and invasive, but they're also creating huge storage and bandwidth problems.

  • August 03, 2006 03 Aug'06

    BlackBerry hosted server feeds SMB mobile email hunger

    BlackBerry maker RIM announced a hosted mobile email server, but some experts are wondering whether it makes sense to have hosted mobile email with an on-site email server.

  • August 03, 2006 03 Aug'06

    Mobile security starts with policy

    Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy.

  • August 01, 2006 01 Aug'06

    Part 2: An introduction to DNS records

    Tutorial: A primer on DNS and MX records, part 2: An introduction to DNS records

  • August 01, 2006 01 Aug'06

    Part 1: How DNS works

    Tuturial: A primer on DNS and MX records, part 1: How DNS works

  • August 01, 2006 01 Aug'06

    Part 4: How to set up a Host record

    Tutorial: A primer on DNS and MX records, part 4: How to set up a Host record

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close