Vulnerability in SQL Server could allow remote code execution
Microsoft is investigating new public reports of a vulnerability that could allow remote code execution on systems with supported editions of Microsoft SQL Server 2000, …
Check Point to acquire Nokia’s security appliance business
Check Point has signed an agreement to acquire Nokia’s security appliance business. The two businesses have collaborated over the past decade to deliver industry-leading …
Zero-day Web malware blocks surpass yearly average
In its monthly Global Threat Report issued today, ScanSafe, the pioneer and leading provider of SaaS Web Security, reported that the rate of zero-day malware blocks increased …
Linux-Based virtual desktop from IBM and co.
IBM, Virtual Bridges and Canonical announced general availability of a Linux-desktop solution designed to drive significant savings compared with Microsoft-desktop software by …
New password-stealing application disguised as a Firefox plugin
BitDefender Labs detected a new type of password-stealing application disguised as a Mozilla Firefox Plugin. The e-threat, Trojan.PWS.ChromeInject.A, is downloaded to a …
Low power unmanaged switches from Allied Telesis
Allied Telesis announced the low-power versions of the AT-FS705LE and AT-FS708LE, two advanced 10/100TX low power unmanaged switched with 5 and 8 ports respectively. The …
Juniper positioned among the leaders of SSL VPN Magic Quadrant
Juniper Networks has been positioned in the “Leaders” quadrant of Gartner’s recently published Magic Quadrant for SSL VPNs.1  The report evaluates vendors …
Malware week: Antivirus360 antivirus and Sinowal.VXR banker trojan
This week’s PandaLabs report includes information about the adware Antivirus360, the Sinowal.VXR banker Trojan and the virus Salit.AN. Antivirus360 is a fake antivirus. …
Microsoft releases Intelligent Application Gateway SP2
Microsoft Whale Communications Intelligent Application Gateway (IAG) 2007 is a remote access gateway that boosts productivity by giving mobile and remote workers, partners and …
Data center transformation a top priority in 2009 for CIOs
New global research reveals that 84 percent of technology organizations are planning to implement a data center transformation (DCT) project in the next 12 months, primarily …
Documenting requirements for RFID data center asset tracking standard
The Financial Services Technology Consortium (FSTC) has published RFID Basic Functional and Numbering Requirements for IT Data Center Assets. Over the last six months, FSTC …
LaCie Ethernet Disk: up to 6TB in a rack-mounted backup appliance
LaCie introduced a new version of its Ethernet Disk, a network-attached storage (NAS) device featuring a capacity increase of up to 6TB in a 1U 19″ rack form factor. …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise