General

Last Updated on 23 Oct. 2015, Total: 168 Blog Posts

  1. Cellphones That Can See Through Walls

    Researchers at the University of Texas in Dallas have designed an imager chip that could turn mobile phones into devices that can see through walls, wood, plastics, paper and other objects. The team's research linked two scientific advances. One involves tapping into an unused range in the electromagnetic spectrum. The other is a new microchip technology. Read more here -... Read More

  2. Cisco IOS XR Software Route Processor Denial of Service Vulnerability

    Customers that are running version 4.2.1 or later of Cisco IOS XR Software, or that have previously installed the Software Maintenance Upgrades (SMU) for Cisco bug ID CSCtz62593 are not affected by this vulnerability... Read More

  3. Cisco TelePresence VX Clinical Assistant Administrative Password Reset Vulnerability

    Cisco has released free software updates that address this vulnerability... Read More

  4. Cloud Computing Assurance Program

    Auditing or assessing risks related to cloud setups may seem daunting at first, especially if an IT audit and assurance professional may lack cloud computing experience. A fine book published by ISACA & ITGI can give you the necessary heads up to initiate an assurance process. It is an excellent starting point but remember that it has to be modified... Read More

  5. Cloud Hosting Explained: Infographic

    What is Cloud Hosting? Guest post and infographic provided by SingleHop... Read More

  6. Complex systems break in complex ways

    According to Peter G. Neumann, an 80-year-old computer scientist at SRI International, the increasing complexity of modern hardware and software has made it virtually impossible to identify the flaws and vulnerabilities in computer systems and ensure that they are secure. Peter's intuition is that complexity has become something that people don't want to hear about and the inclination is now... Read More

  7. Cool Data Center Designs

    Is Facebook aiming at something bigger with its new data center? Rather than commissioning the buildup of its data center, Facebook went for a complete new model, which they call the Open Compute Project. The technology behind Facebook's green data center is developed together with major hardware vendors such as HP, Dell, AMD and Intel which shows that Facebook has... Read More

  8. Crafty Malware

    Although, it's a recommended best practice to test and debug malware in an isolated and contained environment, this post by Marco Ramilli explains how crafty malware can eventually detect this environment and behave in a different way. Malware can detect virtualized environments, active debuggers and sandbox environments. Briefly, malware authors can easily insert code into their software that detects such... Read More

  9. Creating an Office 365 Hybrid Deployment without a Lab Server

    Extract taken from September's MSExchange.org newsletter authored by Henrik Walther, MCM: Exchange Okay so there's quite a few of you that would like to test a migration from an on-premise Exchange environment to Office 365 in order to get some hands on experience prior to doing this as an administrator within your enterprise organization or maybe as a partner consultant... Read More

  10. Cyber Security in the UK!

    According to Nick Hopkinson, the former head of GCHG and CESG, UK is lagging behind the US, Germany and France in its ability to respond to cyber-attacks. This is due to a "lack of cohesion" between the various organizations set up to work towards the national cyber security strategy. But according to UK's Cabinet Office one year after the Strategy... Read More

Featured Links