News

News

  • September 07, 2006 07 Sep'06

    Mobile workers push for smartphones

    Road warriors may prefer smartphones over laptops and PDAs, but equipping your entire mobile workforce with this nifty tool may not be such a great idea.

  • September 07, 2006 07 Sep'06

    SMS phishing is here

    Phishing attacks are no longer limited to email. Recently, researchers uncovered phishing scams using SMS, and mobile experts say enterprises should be wary of these so-called SMiShing scams.

  • August 31, 2006 31 Aug'06

    Online crime as ugly as ever

    At this year's Conference on Email and Antispam, one expert said that despite the increasing complexity of online scams and attacks, digital criminals are less about the technology and more about the crime.

  • August 28, 2006 28 Aug'06

    Symantec peddles enterprise vault tool

    The new Enterprise Vault software contains features developed because of a recent update to the Federal Rules of Civil Procedure.

  • August 22, 2006 22 Aug'06

    McAfee sued for patent infringement

    DeepNines claims McAfee is marking and selling products based on the DeepNines patent for the Security Edge Platform, a unified threat management product that integrates several tools into a single device.

  • Sponsored News

    • Discovering the Business Value of Streaming Analytics

      With streaming analytics you can solve business problems in new ways and seize new revenue opportunities. You can reduce costs and increase efficiency while improving the safety of employees and the security of assets and intellectual property. See More

    • Three Use Cases for Interactive Data Discovery and Predictive Analytics

      Interactive data discovery and predictive analytics technologies allow business users and analysts to identify important trends and relationships in data sets and drill down into questions from any angle. They also allow business users to collaborate with specialists to create, refine and select the best predictive models. See More

    • Better Together: Hadoop and Your Enterprise Data Warehouse

      You’re getting started with a big data analytics project on Hadoop and are impressed by the cost savings on storage compared with your data warehouse. You’ve read that TrueCar, a company that collects vast volumes of car price data for its online car-buying business, has cut its monthly data storage cost from $19/GB to $0.23/GB. So you’re wondering, should you consider moving all your business intelligence efforts to Hadoop? See More

    • Five Steps to Maximizing the Value of Hadoop

      You want to get started with a big data project at your company, but you're unfamiliar with Hadoop and you're unsure your project will deliver value. Relax. Many organizations are struggling to implement Hadoop for a variety of reasons. In "The Current State of Hadoop in the Enterprise," by the International Institute for Analytics and sponsored by SAS, you'll find a handy list of five steps to maximize the value of a Hadoop big data project for your organization. See More

    View All Sponsored News
  • August 17, 2006 17 Aug'06

    BlackBerry vulnerability, mobile viruses are real threats

    At this month's Black Hat conference, a presentation centered around BBProxy, a hacking program that can take advantage of the trust relationship between a BlackBerry and an enterprise's internal server to hijack network connections.

    That, ...

  • August 17, 2006 17 Aug'06

    Antivirus researcher Gullotto leaves Symantec for Microsoft

    One of the industry's most knowledgeable AV gurus has left Symantec for Microsoft. Vinny Gullotto will be charged with forming an AV research unit to rival Symantec and McAfee.

  • August 16, 2006 16 Aug'06

    Clearing the confusion around circular logging

    Because Microsoft's circular logging recommendations have changed over the years based on Exchange Server version changes, there is a lot of contradictory information out there on the topic. This article explains what circular logging is and the ...

  • August 08, 2006 08 Aug'06

    McAfee products vulnerable to code execution flaw

    VirusScan, Personal Firewall Plus, SpamKiller and other McAfee products are reportedly vulnerable to an unspecified remote code execution flaw.

  • August 04, 2006 04 Aug'06

    Image-based spam scams on the rise

    By using images instead of text, spammers are invading your inbox with a lot more than offensive language. Not only are the emails vulgar and invasive, but they're also creating huge storage and bandwidth problems.

  • August 03, 2006 03 Aug'06

    BlackBerry hosted server feeds SMB mobile email hunger

    BlackBerry maker RIM announced a hosted mobile email server, but some experts are wondering whether it makes sense to have hosted mobile email with an on-site email server.

  • August 03, 2006 03 Aug'06

    Mobile security starts with policy

    Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy.

  • August 01, 2006 01 Aug'06

    Part 2: An introduction to DNS records

    Tutorial: A primer on DNS and MX records, part 2: An introduction to DNS records

  • August 01, 2006 01 Aug'06

    Part 1: How DNS works

    Tuturial: A primer on DNS and MX records, part 1: How DNS works

  • August 01, 2006 01 Aug'06

    Part 4: How to set up a Host record

    Tutorial: A primer on DNS and MX records, part 4: How to set up a Host record

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close