Blogs

View All RSS Feed

Last Updated on 19 Dec. 2014, Total: 1193 Blog Posts

589 George Chetcuti’s Blog 19 Dec. 2014
604 Windows Networking Admin Blog 6 June 2014
  1. Intel acquires digital identity manager PasswordBox

    Acquisition Adds Convenient and Secure Digital Identity Solutions for Consumers to Intel Portfolio... Read More

  2. Four Lessons Retailers Should Have Learned from the Target Security Breach

    Netwrix recommends best practices for retailers to maintain security during holiday shopping season... Read More

  3. "Body recognition" compares with fingerprint ID

    A range of human anatomical features and body measurements can help to identify a person, such as from closed circuit television (CCTV) security videos, no matter what clothing the person may be wearing... Read More

  4. More on the 19 year old bug

    Although APT3 is well known for employing zero-day exploits in their attacks, recent activity has demonstrated that they will also attack targets with known exploits or social engineering... Read More

  5. UPnP Forum Invites Organizations to use UPnP+ Certification

    UPnP+ is an evolution of previous UPnP capabilities and provides an improved experience for the consumer and creates new values and opportunities for manufacturers leveraging existing UPnP protocols to take them into the Cloud and bridge IoT... Read More

  6. 5nine Software announces new funding

    5nine Software Announces New Investment Round led by Insight Venture Partners and the founders of Veeam Software... Read More

  7. Unitrends Unveils Boomerang, A Way to Move VMs between VMware and AWS

    New virtual appliance enables businesses of all sizes to cloudburst, protect and migrate virtual machines... Read More

  8. Fix for a 19 year old bug

    The IBM X-Force Research team has identified a significant data manipulation vulnerability that affects every version of Microsoft Windows from Windows 95 onward... Read More

  9. What does a mobile devices manufacturer know about its customers?

    Nowadays every electronic device can potentially steal our data and send it to some company in another part of the world, in absolute silence... Read More

  10. Open and Free Internet – net neutrality

    No blocking, no throttling, no paid prioritization, more transparency. The Internet is perhaps the most open network in history, and we have to keep it that way... Read More

Featured Links