Adobe patches critical Acrobat vulnerabilities
Critical vulnerabilities have been identified in Adobe Reader 9.1.1 and Acrobat 9.1.1 and earlier versions. These vulnerabilities would cause the application to crash and …
A long list of Safari 4.0 security fixes
Apple has released Safari 4.0, the latest version of its popular web browser. Besides all the new functionalities, this release includes a long list of security fixes. Details …
Fujitsu’s 40 Gbps interfaces for its FLASHWAVE 7500 ROADM
Fujitsu Network Communications announced the availability of second-generation 40 Gbps interfaces for its FLASHWAVE 7500 Reconfigurable Optical Add/Drop Multiplexer (ROADM). …
Fedora 11 is now available
Fedora is a Linux-based operating system that showcases the latest in free and open source software. Fedora is always free for anyone to use, modify, and distribute. Fedora 11 …
TweetGrade: online user reputation on Twitter
Purewire launched TweetGrade, which provides a quantitative assessment of a user’s reach and influence in the Twitter community, and it helps people understand a …
DeviceAnywhere introduces Palm Pre to its developer network
DeviceAnywhere added the new Palm Pre phone to its network of 2000+ feature phones and smartphones available over the DeviceAnywhere platform and accessible by organizations …
New book: “The Twitter Book”
Given the intense media spotlight shining on Twitter right now, chances are if you haven’t twittered yet, you’re probably considering it. So what is Twitter? Why …
Netbook privacy filter from 3M
3M announced a new range of privacy filters specifically designed for the netbook market. New Vikuiti Netbook Filters from 3M, initially available to fit 8.9″ and …
First iPhone WLAN management application
E(z)RF OnTheGo is the first wireless LAN management application available on a smartphone, has been introduced by Meru Networks for the Apple iPhone. Network administrators …
Kerberos 5 Release 1.7 is now available
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free …
Event-based forensics on wireless LANs
E(z)RF Network Manager 2.0, the first wireless LAN management system to record every client-network wireless protocol interaction, rather than merely gathering aggregate …
Gartner survey shows worldwide IT budgets to decline 4.7 percent this year
In the first quarter of 2009, CIOs experienced significant IT budget revisions as executives gained a greater understanding and solidified plans for addressing the global …
Featured news
Resources
Don't miss
- Cisco patches another actively exploited SD-WAN zero-day (CVE-2026-20182)
- Unpatched Microsoft Exchange Server vulnerability exploited (CVE-2026-42897)
- Deepfake detection is losing ground to generative models
- Fragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300)
- Vector embedding security gap exposes enterprise AI pipelines