The opportunities in unified communications for vendors and end-users are obvious, but how can the channel cash in on this snowballing technology?

Next Microsoft CEO faces rocky road in easing NSA-fueled privacy worries
When Microsoft Chief Executive Steve Ballmer steps down in the next 12 months, his successor will be left with the …

Hackers steal millions after US banks cyberattack
At least three U.S. banks have lost millions of dollars after fraudsters gained control of payment applications that control wire transfers.

Cisco patches serious vulnerabilities in Unified Communications Manager
Cisco Systems has released new security patches for several versions of Unified Communications Manager (UCM) to address vulnerabilities that could allow remote attackers to execute arbitrary commands, modify system data or disrupt services.

Windows 8 Update: Microsoft dumps ad agency touting Windows 8, Surface
As Windows 8 struggles to take off, Microsoft has decided to hire a new ad agency to handle the digital promotion of both the operating system and Microsoft Surface tablets.

Security expert kicks off crowd-sourced fund to pay Facebook bug finder a $10K bounty
After a Palestinian researcher was denied a bug bounty by Facebook, Marc Maiffret, CTO of BeyondTrust, kicked off a crowd-sourced fund yesterday to come up with a reward.

Self-service BI isn't self-enabled
For many companies, the self-service business intelligence (BI) experience is similar to the early days of agile development. Back then, companies flocked to agile methodologies, drawn by the promise of faster delivery cycles, improved business-IT relations and expedited delivery.

The real vulnerabilities lie in operation technology: Gartner
Lax password implementation has meant that operational technology (OT) is now vulnerable to security attacks.

Cyber security is all hype and no substance: Gartner
Everything you have heard about cyber security is wrong, according to Gartner VP and distinguished analyst, John Girard.

Facebook fixes timeline bug, cites language trouble in delay
A Facebook engineer blamed language difficulties and documentation issues for a delay in fixing a bug that let a security researcher post directly to founder Mark Zuckerberg’s Timeline, which is restricted if two users aren’t friends.

"Jekyll" test attack sneaks through Apple App Store, wreaks havoc on iOS
Acting like a software version of a Transformer robot, a malware test app sneaked through Apple’s review process disguised as a harmless app, and then re-assembled itself into an aggressive attacker even while running inside the iOS “sandbox” designed to isolate apps and data from each other.

Hackers targeting servers running Apache Struts applications, researchers say
Chinese hackers are using an automated tool to exploit known vulnerabilities in Apache Struts, in order to install backdoors on servers hosting applications developed with the framework.

Google boosts flaw bounties to AED 18,365 on Chromium program
Google is upping the rewards it offers to bug hunters on its Chromium Vulnerability Rewards (VRP) program to AED 18,365 ($5000) for those previously rated at AED 3,673 ($1,000), the firm has announced.

Talent shortage looms in Big Data: Hudson
A significant global talent shortage is looming as companies seek to leverage Big Data for competitive advantage but struggle to …

Government urged to put up customised defence to combat cyber attacks
Investing in anti-virus software is no longer enough to counter cyber attacks on vital data systems, especially if national security is at stake.

Quarterly report outlines Android vulnerabilities as biggest security concern
Android vulnerabilities make for some of the biggest security concerns of the moment, according to Trend Micro’s Q2 2013 Security Roundup Report.

Hackers use royal baby news as social engineering lure
It may be old news now, but hackers are still using news of the royal baby’s birth to entice people into clicking on malicious links, according to researchers at Trend Micro.

If governments ban China-based Lenovo, should companies?
If US intelligence agencies ban the computers of a Chinese company from classified networks should companies also avoid the same products? What if the vendor is one of the world’s largest PC makers?

TOR Project: Stop using Windows, disable JavaScript
The TOR Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered network.

DDoS attacks getting bigger but shorter in duration
Distributed Denial of Service (DDoS) attacks are getting bigger, but their duration are getting shorter, according to an analysis released …


