Graphics chip maker Nvidia released a new version of its Unix driver on Friday in order to address a high-risk vulnerability that can be exploited by local users to gain root privileges on Linux systems. The privilege escalation ...
Tags: graphics chip, Nvidia, Unix driver, high risk vulnerability
IGEL Technology, a leading worldwide thin client manufacturer, announced today its partnership with international IT and data security specialist, CenterTools. The partnership strengthens IGEL's commitment to providing the highest level of ...
Tags: IGEL Technology, thin client manufacturer, IT, data security
A top Apple security guru Thursday presented an in-depth view into the security architecture for iOS, the basis of iPhones and iPad tablets, underscoring the complex certificate-based encryption framework Apple has adopted. Our attitude ...
Tags: Apple, security guru, iOS, iPhones, iPad tablets, crypto architecture
A researcher scored again against Oracles database by demonstrating at the Black Hat security conference Thursday an exploit that would allow him to take control as an administrator. David Litchfield, a researcher at Accuvant Labs, demoed ...
Tags: Oracles database, Black Hat, security conference, David Litchfield
It has been a big year for some tech luminaries, with several of them getting a nod from editors picking Time Magazine's Person of the Year. Calling him the "architect of the New America," President Barack Obama Wednesday was named Time's ...
Tags: Person of the Year, Time's, Obama, tech industry
2X Software, a global leader in desktop virtualization and application delivery, today announced full compatibility with IGEL Linux thin clients. The company's 2X ApplicationServer XG is now available on IGEL Linux thin clients with the ...
Tags: 2X Software, desktop virtualization, application delivery
After almost a year of preparation, The OpenStack Foundation has launched as a stand-alone nonprofit organization, freeing its namesake stack of open source cloud hosting software from the management of hosting provider Rackspace. ...
Tags: OpenStack Foundation, nonprofit organization, open source, cloud, software
Several big vendors including Red Hat, Oracle, Cloudera and Citrix have made announcements this week that show software support is on its way for 64-bit ARM hardware The companies all announced development plans for 64-bit ARM hardware. ...
Tags: 64 bit, ARM, Citrix, hardware, Oracle, Red Hat, software
Facebook's announcement that it now has more than a billion active users shows the resiliency of the social networking platform, analysts say. "It's a platform that has survived and grown despite its privacy issues, usability issues and ...
Tags: Facebook, active users, social networking platform, resiliency
Red Hat announced today that it will host a seven-city tour of two-day partner conferences alongside IBM and Symantec, kicking off on September 17 in Stockholm, Sweden. The tour will be arriving in the Middle East on October 2nd and 3rd ...
Tags: conference, IBM, Red Hat, Symantec, Tour
Red Hat today announced it has acquired business process management (BPM) technology developed by Polymita Technologies. The deal accelerates Red Hat’s entry into the BPM software segment and augments its JBoss Enterprise Middleware ...
Tags: BPM technology, Polymita, Red Hat, Solutions provider
Marvell plans to begin selling PCIe adapter cards that will act as I/O accelerators or cache in order to boost the performance and resiliency of consumer-class solid-state drives (SSDs). Each of the cards allows for up to four SSDs to be ...
Tags: Marvell, PCIe adapter cards, I/O accelerators, SSDs
Pwnie Express, a Vermont cybersecurity startup, and creator of the Pwn Plug, the first-to-market penetration testing drop box, will unveil two new pentesting products at Black Hat USA 2012 and Defcon 20. Black Hat is being from July 21-26 ...
Tags: Pwnie Express, cybersecurity, penetration testing drop box, company news
A year after Apple co-founder Steve Jobs' death, the company has changed, analysts said today. Oh, no it hasn't, said others. There's no question that in the 12 months since Jobs' death on Oct. 5, 2011, Apple has remained a powerhouse ...
Tags: Steve Job, Apple, analysts, powerhouse
Cyber criminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. Three months ...
Tags: Black Market, malware, Proxy, Symantec, Computers