Adobe patched a critical vulnerability in its PDF viewing and editing software that hackers have been exploiting for more than …
Patching it up
By all accounts, patching software is a disruptive, time-consuming process requiring IT departments to test any new software patch before …
NAC: Now? Or Never?
Today's highly mobile workforce, along with a plethora of new tech gadgets and access to the Internet from anywhere, has …
Attackers exploit unpatched Excel vulnerability
For the second time in the past five days, security researchers are warning that hackers are exploiting a critical unpatched …
Adobe flaw has been used in attacks since early January
A dangerous and unpatched vulnerability in Adobe Systems Inc.'s PDF-reading software has been around a lot longer than previously realized. …
Hackers exploit unpatched Adobe Reader bug
Hackers have been exploiting a critical bug in Adobe Reader, the popular PDF-viewing software, for at least nine days, researchers …
Cisco, Trend Micro put security in home routers
Through a partnership announced Tuesday, two models of Linksys by Cisco Wireless-N routers will come with software for the Home …
Microsoft announces $250,000 Conficker worm bounty
The spreading Conficker/Downadup worm is now viewed as such a significant threat that it's inspired the formation of a posse …
Conficker worm draws a counter-attack
In addition to the team's mission to grab domain names Conficker (aka Downadup) might try to use, Microsoft is offering …
Quantum upgrades disk-based backup
Quantum last week upgraded its disk backup and remote replication DXi7500 device to include multi-site replication and direct tape creation …
Give Vista a Windows 7 Makeover
Let's be realistic, Windows 7 is pretty much going to be like Windows Vista with a fresh coat of UI …
Norton Utilities brand revived for Windows XP, Vista
Symantec announced it has revived the Norton Utilities optimization and cleanup tools for Windows that it folded years ago into …
Social networking sites a hotbed for cyber crime
The distribution of malware on social networking sites first occurred in small amounts towards the end of 2007, but that …
Conficker hitting hardest in Asia, Latin America
Computer networks in Asia and Latin America are the most susceptible to a fast-spreading computer worm, which has infected between …
Top 25 software screw-ups
Most IT security woes, from software patching to cyberespionage and cybercrime, can be traced to the devastating effects wrought by …
Doing more with less
Nearly every initiative data center managers pursue today has a common goal: getting more work done with fewer resources, according …
Network vendors eye new markets in ’09
Microsoft aims to become a dominant player in hosted software and cloud computing in 2009, despite its late entry in …
Norton 360 enhances its backup & security
Symantec announced Version 3.0 of its Norton 360 desktop software, which is used to back up documents and digital photos …
Virtualisation risks
Does transitioning to virtualization increase security risks within a company? IT managers appear to be at loggerheads with IT security …
Formula for efficiency
It is not so prosaic that you find systems integration (SI) companies that span over three decades and are still …