Juniper Networks this week has rolled out edge routers designed to enable service providers to rapidly deploy new service applications. Juniper's MX2020 and 2010 3D Universal Edge Routers run software called JunosV App Engine that's ...
Adobe today issued a surprise update for Flash Player that patched 25 critical vulnerabilities in the ubiquitous media software. The California company urged Windows users to apply the update in the next 72 hours after rating the fix as ...
Tags: Adobe, Flash Player, Microsoft, IE10 Flash Patching, Google
Microsoft today announced it will deliver seven security updates, one critical, to patch 20 vulnerabilities in Office, SharePoint Server, SQL Server, Windows and other parts of its product lineup. "It looks like an Office month," said ...
Tags: Microsoft, security updates, vulnerabilities, Office, SharePoint Server
VDI (virtual desktop infrastructure) is one of the hottest technologies going, and there are nearly as many ways to deploy it as there are companies providing the solutions. Some VDI solutions are server-based, running on "big iron" in a ...
Tags: VDI, virtual desktop infrastructure, technologies, BYOD
Centric Software, Inc., will offer a Software Developer’s Kit (SDK) for its mobile product lifecycle management (PLM) apps. “The Centric 8 Mobile App SDK enables companies to benefit from the leading work Centric is doing in ...
Tags: Centric Software, SDK, PLM apps, mobile technology
Amazon Web Services has submitted an entry to the Cloud Security Alliance's Security, Trust & Assurance Registry (STAR), a move that sheds some light into the security features of its IaaS cloud offering. The CSA launched its STAR program ...
Tags: Amazon Web Services, Cloud Security, STAR, CSA
In a new twist, spammers have built a botnet that sends SMS spam through infected Android phones, shifting the potentially pricey cost of sending spam to victims. The trend, spotted by security vendor Cloudmark, poses a new challenge ...
Tags: spammers, a mobile spam campaign, spam messages, Android
MakeDomainPrivate.com was launched today bringing a new LIFETIME alternative for making domain names private for $10. "With the average Private Domain Service offered in the market at $9.99 per year, our $10 LIFETIME domain privacy option ...
Tags: domain name, Private Domain Service, network, website
Security researchers have uncovered a highly sophisticated, multi-tiered, global financial fraud ring that has attempted fraudulent transfers of up to 1.6bn from at least 60 banks This fraud empire, discovered by researchers from security ...
Tags: financial fraud, security, banking system, financial security
Storage vendor Hitachi Data Systems announced today that it is selling a prebuilt infrastructure and a pretested reference architecture that combine servers, networks, storage and management components that can be deployed in days. HDS's ...
Tags: HDS, storage vendor, prebuilt infrastructure, UCP
Approximately 3.6 million Social Security numbers and 387,000 credit and debit card numbers belonging to South Carolina taxpayers were exposed after a server at the state’s Department of Revenue was breached by an international ...
Tags: credit cards, Data leak, protection, security breach, Social securtiy
LONDON -- Cloud computing may have become the “phrase du jour” for the IT industry but the vastly overused term still means different things to different people. Here are a few cloud computing definitions from IT pros, ...
Tags: cloud computing, IT industry, London, software, IT
In a move to speed online transaction processing (OLTP), Microsoft is adding in-memory capabilities into its SQL Server relational database management system. The next version of SQL Server will feature the ability to host database tables ...
Tags: ERP, HANA, Microsoft, SQL Server
The Samsung Galaxy S3 can be hacked via NFC, allowing attackers to download all data from the Android smartphone, security researchers demonstrated during the Mobile Pwn2Own contest in Amsterdam on Wednesday. Researchers from security ...
Tags: Samsung, Galaxy S3, NFC, Mobile Pwn2Own competition
Cybercriminals no longer control one of the world's largest spam botnets, Grum, because all of the servers the botnet relied on for receiving commands were shut down, according to researchers from security firm FireEye. The last Grum ...
Tags: Cybercriminals, spam botnets, Grum, servers