Monthly Archives: May 2015

Verizon

Verizon Patches Security Flaw That Could Have Affected Millions

0
Verizon patched an online security vulnerability that could have allowed attackers to take control of some 9 million customers' home Internet accounts.The flaw was...
IBM Flash storage

Putting IBM Flash Tech to Work, From Beverage to Travel Firms

0
Putting IBM Flash Tech to Work, From Beverage to Travel Firms by Darryl K. Taft Memorial Hermann Health System Memorial Hermann Health System, the largest nonprofit health...
hackers

FireEye Exposes Hackers Hiding Botnet Controls on Microsoft Site

0
One of the key tools used by IT security professionals to defend against botnets is blacklisting the suspected IP address of command and control...
Intel 4004 processor (1971)

Moore’s Law and Intel Mark Milestones in Tech History

0
Moore's Law and Intel Mark Milestones in Tech History by Jeffrey Burt 1965—Gordon Moore Makes a Prediction Moore, in an article in an electronics trade magazine, predicts...
Cloud deployment

10 Ways IT, Business Leaders Must Collaborate on Cloud Strategies

0
10 Ways IT, Business Leaders Must Collaborate on Cloud Strategies by Chris Preimesberger Schedule Meetups to Collaborate on Cloud Decisions The process of cloud decision-making has changed...
Lumia 640

Microsoft Lumia 640 Smartphone Comes to Cricket Wireless

0
Cricket Wireless is now offering the Microsoft Lumia 640 smartphone to its no-contract wireless customers, packing plenty of quality features and a low $129.99...
cloud developers

Intel, Fujitsu Partner on IoT Platform

0
Intel and Fujitsu are teaming up to create a platform that can be used to build solutions for the growing Internet of things.Under the...
cyber-crime

Is Homegrown Cyber-crime the Next Big U.K. Security Threat?

0
By Michael MooreFar from keeping aware of threats from around the world, it seems that some of the biggest cyber-security threats facing British businesses,...
it management and comptia

IT Security, Staffing a Top Priority for Businesses in 2015

0
About half of businesses expect to increase their hiring of IT staff during 2015, according to a global survey of 1,507 business and IT...
VENOM flaw

The Venomous Search for the Next Heartbleed, and VENOM Isn’t It

0
On April 7, 2014, the security world transformed with the disclosure of the Heartbleed vulnerability, and that was never more evident than with Wednesday's...