HomeLatest News

Latest News

Money Mules: The Hidden Side of Phishing

The dramatic rise in phishing and identity theft attacks includes a well-organized offline component—the not-so-innocent "money mule" recruited by fraudsters to launder stolen money...

Let the Browser Wars Begin—Again

Firefox 2.0 is almost here, and Microsoft is expected to start pushing out Internet Explorer 7 to users via the Windows Automatic Update software-distribution...

Is the Botnet Battle Already Lost?

Its dress-down Friday at Sunbelt Softwares Clearwater, Fla., headquarters. In a bland cubicle on the 12th floor, Eric Sites stares at the screen of...

Axiom System Extends to Entry-Level, Enterprise Markets

Network storage systems provider Pillar Data Systems is expanding beyond its midmarket roots with systems that target both small businesses and larger enterprises. New enhancements...

High Priority on LAN Assets

ConSentry Networks LANShield Controller CS2400, now with LANShield OS 2.2, provides perimeter-level network access and security controls within the LAN. The solution also takes...

LifeSize Room Ups Conferencing Ante

Theres been a lot of hype around high definition, and the hoopla has made its way to videoconferencing. However, based on eWEEK Labs tests...

ThinkTank Mitigates Meeting Mopiness

Who doesnt want better management and accountability for meetings? Ah, but what tools exist to achieve those results? GroupSystems ThinkTank 1.1 does a good...

CA Aims to Help Improve IT Governance – 2

CA on Oct. 9 made its biggest bid yet to help IT customers get their budgets under control when it introduced a major upgrade...

The ABCs of DIY IT

Like many homeowners today, Im a big proponent of DIY, or do-it-yourself, home maintenance and upgrades. Im a regular customer of my local home...

Far-Flung Danger

Remote workers continue to expose their employers to a wide range of IT threats by using poor laptop etiquette and connecting to corporate systems...