By understanding the growing number of threats to their networks and what countermeasures to take to minimize security risks, mobile operators can protect their customers and their networks against many of the attacks that inevitably will take place. This white paper describes the most common attacks on mobile networks and what to do about them.
Read More
Top Threats to Mobile Networks - And What to Do about Them | timesofitsecurity.com
Posted by rupalik under TechnologyFrom http://www.timesofitsecurity.com 5719 days ago
To Virtualize The Desktop Or Not? | timesofvirtualization.com
Posted by himangim under TechnologyFrom http://www.timesofvirtualization.com 5719 days ago
A steady stream of upgrades to leading desktop virtualization releases are taking aim at some of the crucial shortcomings in the technology in the hopes that financially strapped enterprises will start to view VDI as a necessity rather than a luxury.
Read More
One-Third of Windows PCs Susceptible to Worm | timesofitsecurity.com
Posted by rupalik under TechnologyFrom http://www.timesofitsecurity.com 5719 days ago
The worm that has infected several million Windows PCs is causing havoc because nearly a third of all systems remain unpatched 80 days after Microsoft rolled out an emergency fix, a security expert said Thursday.
Read More
Sun VirtualBox A Solid Alternative To VMware, Parallels
Posted by himangim under TechnologyFrom http://www.timesofvirtualization.com 5722 days ago
Sun Microsystems' xVM VirtualBox desktop virtualization software is an increasingly powerful, no-cost alternative to VMware Workstation and Parallels Desktop products and should be added to the consideration shortlist of software developers and IT managers. Any IT professional who wants to get more familiar with virtualization technology that goes
Read More
McAfee: Google Developer Site Being used to Distribute Malware | timesofitsecurity.com
Posted by rupalik under TechnologyFrom http://www.timesofitsecurity.com 5722 days ago
Google's free code-hosting Web site for developers is being used to distribute malware, a security researcher said on Friday. Google Code is a place where programmers can host projects and code. Along with the legitimate code are links to fake videos that direct users to download a missing codec, said Dave Marcus, director of security research fo
Read More
RFID Helps Diagnose Early Dementia | rfidied.com
Posted by himangim under TechnologyFrom http://www.rfidied.com 5722 days ago
In Greek mythology, Hermes acted as a messenger, relaying information between humans and the gods, while also protecting boundaries. That makes him an apt namesake for the Health Research Management and Evaluation System, or HERMES—a preventative health-care system developed at the University of South Florida that has already been tested at one as
Read More
How To Avoid Hacking, And Prevent Internet Security Problems | timesofitsecurity.com
Posted by rupalik under TechnologyFrom http://www.timesofitsecurity.com 5722 days ago
Hacking has become a big problem concerning Internet security, one that even affects the government and other high security computer networks. Hacking attacks can range from mildly annoying or just disruptive, or they can threaten finances and even the security of people and the country.
Read More
Securing Voice Networks
Posted by mona19 under TechnologyFrom http://www.voipoholic.com 5723 days ago
Companies are increasingly adopting Voice over IP (VoIP) for their corporate telephony infrastructure. With VoIP telephony replacing traditional public switched telephone network (PSTN) telephony services, companies have concerns around the security of VoIP services. Users tend to trust the PSTN since it is more infrastructure based and the infras
Read More
New Phishing Attack Targets Online Banking Sessions With Phony Popups | timesofitsecurity.com
Posted by rupalik under TechnologyFrom http://www.timesofitsecurity.com 5723 days ago
The so-called "in-session phishing" attack prompts the victim to retype his username and password for the banking site because the online banking session "has expired," for instance, via a popup that purports to be from the victim's bank site, according to researchers at Trusteer
Read More
5 Key Virtual-Machine Management Questions | timesofvirtualization.com
Posted by himangim under TechnologyFrom http://www.timesofvirtualization.com 5723 days ago
1. How are versions of virtual-machine snapshots of images tracked? The 'snapshots' of images (including virtual-machine guest-operating-system states) must be tracked in terms of where they sit on the network, how they are being used and their appropriate fix and patch status. A popular use of virtual-machine technology is wrapping guest operat
Read More
Subscribe
“Adam, Great post. My feeling? It's better to already HAVE a blog than...”
“That's a good list of steps in keeping with self-discipline. I concentrate...”
“At a time where I am seriously considering utilizing videos for my online...”
“As I soon close in on the start of a 365 day countdown to retirement age...”
“You lay out some good solid tips to give an entrepreneur like myself a...”