Blog

Home/Blog/
11 07, 2014

Oracle to release 115 security patches

By |July 11th, 2014|Categories: Tech News|0 Comments

This post was originally published on this site

Java SE and Fusion Middleware alone will receive nearly 50 fixes in Tuesday’s update

July 11, 2014
(IDG News Service)

Oracle is planning to release 115 security patches for vulnerabilities affecting a wide array of its products, including its flagship database, Java SE, Fusion Middleware and business applications.

The update includes fixes for 20 weaknesses in Java SE, all of which can be exploited by an attacker remotely, without the need for login credentials, Oracle said in an announcement prior to Tuesday’s patch release.

Some 29 fixes are for Oracle’s Fusion Middleware suite, with 27 able to be exploited over a network without the need for authentication. Affected middleware components include BI Publisher, GlassFish Server, HTTP Server, JDeveloper, WebCenter Portal and WebLogic Server.

Six other patches are for Oracle’s database. Two of the vulnerabilities can be exploited remotely without login credentials.

Another seven patches target Hyperion, […]

This post was originally published on this site

11 07, 2014

Microsoft buys InMage to boost Azure Site Recovery

By |July 11th, 2014|Categories: Tech News|0 Comments

This post was originally published on this site

Microsoft will integrate InMage’s technology into the cloud-based backup and recovery service

July 11, 2014
(IDG News Service)

Microsoft plans to enhance its Azure cloud backup and recovery by integrating technology from InMage, a business continuity vendor it just acquired.

InMage’s software continuously captures changes in data in real time to help enterprises immediately recover data to local systems or fail over to remote sites. Microsoft plans to integrate the company’s flagship Scout product, which is available both on appliances and as a cloud platform, with the Azure Site Recovery service.

Azure Site Recovery, formerly called Hyper-V Recovery Manager, was introduced last month and is designed as a cloud-based alternative to enterprises building and maintaining their own remote sites for disaster recovery.

The acquisition, for an undisclosed sum, will help to make Azure the best disaster recovery site for all types of IT environments, including […]

This post was originally published on this site

11 07, 2014

A Week in the News: Patch Tuesday and World Cup Scams

By |July 11th, 2014|Categories: Tech News|0 Comments

This post was originally published on this site

In the news this week: we’ll revisit the Microsoft-NoIP takedown situation, discuss the week’s most important security updates, take a look at a new World Cup themed scam, and check in on the world of Android Vulnerabilities.

Microsoft V. NoIP

As we wrote in last week’s Friday news round-up, Microsoft filed a temporary restraining order against a small hosting company called No-IP, which allowed them to seize control of just fewer than two dozen domains registered with that company. Microsoft alleged that the company was profiting by allowing criminals to host malware-laced domains and botnet infrastructure on the sites they controlled. No-IP and a number of folks in the security industry contested the move quite strongly, though the takedown had its proponents as well. If you want a bit of background covering all sides of the incident, Costin Raiu, the director of Kaspersky Lab’s Global Research […]

This post was originally published on this site

9 07, 2014

Gloves Come Off as BlackBerry Fires Back at Good Technology

By |July 9th, 2014|Categories: Tech News|0 Comments

This post was originally published on this site

CIO – BlackBerry is in full defensive mode these days. Rightly so. These are troubling times for the Canadian company.

BlackBerry’s biggest enemy today may be consumer perception. And its biggest new threat could very well be enterprise perception. BlackBerry recently shifted its strategy (yet again) to focus strictly on the enterprise, so its foothold there has never been more important.

Today, BlackBerry has less than one percent of the overall global smartphone market, according to IDC, down considerably from just a few years ago. Part of the reason for that is the public perception that BlackBerry phones “aren’t cool” anymore.

It’s a (sad) fact that the average consumer really does care what his or her friends think about their smartphone of choice, and that has really hurt BlackBerry. Today, BlackBerry’s competitors are trying to shift business customers away from BlackBerry EMM products by shifting the perception of the company in […]

This post was originally published on this site

9 07, 2014

Russian Windows leaker denies link to ex-Microsoft worker who stole trade secrets

By |July 9th, 2014|Categories: Tech News|0 Comments

This post was originally published on this site

But Wzor acknowledges that the case prompted move to go underground and break off communication with sources

July 9, 2014
(Computerworld)

Notorious Russian leaker Wzor recently denied any link between the frequent publication of internal Microsoft information and the former employee who was arrested in March for stealing trade secrets — including early builds of Windows — and sharing them with others.

“Personally, I do not know him, and I do not think he ever wants to meet me, especially in light of events that happened to him,” Wzor wrote on a Russian-language discussion board last month, according to a machine translation.

Wzor, whose identity is unknown — to the point whether it’s unclear if the nickname is for one individual or a group — has been assumed to be Russian.

That is also the nationality of Alex Kibkalo, the former Microsoft architect who was […]

30 05, 2014

Tasty Spam: Sneaky URLs Trick Victims in Diet-Pill, Work-From-Home-Scams

By |May 30th, 2014|Categories: Security, Tech News, Virus Alerts|0 Comments

This post was originally published on this site
Via Flickr user Jerry PankMail providers are getting better at filtering out spam before it even hits our Inboxes. Even so, some messages still get through. The spammers are continually tweaking their campaigns to get past the spam filters. Sometimes, we get spammed because our friends fell for a scam. Spam is still a problem, but it is one we can solve.

SecurityWatch asked the security experts at Cloudmark to flag and analyze an ongoing spam campaign. We take a look at the type of messages being sent and the infrastructure behind the operation used. This month, we look at an operation called “Com Spammers.”

The Com Spammer Operation
The Com Spammer operation specializes in work-from-home schemes, diet pills, and recently, a miracle anti-aging skin cream. The gang monetizes the email and SMS spam campaigns through victims who sign up to buy one of these products. In the case […]

This post was originally published on this site

30 05, 2014

Step-by-Step: How to Use the Safe Browser on Android

By |May 30th, 2014|Categories: Applications, How To, Tech News|0 Comments

This post was originally published on this site

If your kids often borrow your phone to surf the Internet, you need to think about the safety and security of their actions. Lacking user experience, they can follow dangerous or phishing links.

With Kaspersky Internet Security for Android, you can run a special browser that allows the opening of safe sites only.

Jump to slides

webfilter_EN

Setting up safe browsing

Protect your smartphone now!

QR-codes

This post was originally published on this site

30 05, 2014

Unplug ghost servers, save a bundle

By |May 30th, 2014|Categories: IT Industry, Networking, Tech News|0 Comments

This post was originally published on this site

Users who decommission equipment quantify savings for Uptime Institute

May 9, 2014

(Computerworld)

The Uptime Institute estimates that 20% of all racked IT equipment has no earthly function other than to warm the planet. But for data centers that do manage to unplug equipment, the savings are significant.

To draw attention to the issue of what are sometimes called “ghost servers,” Uptime held a contest, inviting data center managers to submit their own efficiency efforts. The results are impressive.

Barclays, the top performer in Uptime’s ranking, removed 9,124 physical servers last year. Those servers, in total, consumed 2.5 megawatts (MW) of power and could fill 588 server racks. The company’s power bill would be $4.5 million higher if the systems were still running.

Moreover, Barclays saved $1.3 million on legacy hardware maintenance costs and freed up more than 20,000 network ports and 3,000 SAN ports.

Sun Life Financial […]

This post was originally published on this site

29 05, 2014

A Week in the News: eBay Hacked, Internet Explorer Vulnerable

By |May 29th, 2014|Categories: Security, Tech News|0 Comments

This post was originally published on this site

This week wasn’t an overly busy one in terms of security news. However, yesterday’s announcement that attackers breached a server containing user passwords at the online retail and auction giant eBay has to be the biggest story of the week. Closely behind that – in terms of importance – was the emergence of yet another zero-day in Microsoft’s very widely used Internet Explorer Browser. Stepping away from bad news, Samsung is going beyond fingerprints, identifying new ways of biometric authentication. And, as always, we have some patches to mention, if only in passing.

week

eBay Compromised

eBay announced yesterday through its corporate website (eBay Inc.) that attackers compromised a database containing customer names, encrypted passwords, email addresses, physical addresses, phone numbers, and dates of birth. Because encrypted passwords were stored in the breached server, eBay will be forcing users to change passwords in the coming […]

This post was originally published on this site

29 05, 2014

How to shoot amazing video from drones

By |May 29th, 2014|Categories: How To, Tech News|0 Comments

This post was originally published on this site
STORY HIGHLIGHTS
  • Hobbyists are using small drones to shoot aerial photography
  • With a few hundred dollars and practice, you can make breathtaking aerial videos
  • Keep drones and other model aircraft less than 400 feet above the ground
  • Learn to fly a cheap, toy drone, before adding a camera

(CNN) — A bird’s eye camera sweeps over the green fields of Ireland, flies over the towering Cliffs of Moher and pans the ocean hundreds of feet below.

It’s just like a scene in a movie. But this is not Hollywood magic. The spectacular footage was shot, not by a film crew in a helicopter, but with an inexpensive toy drone — an unmanned aerial vehicle, or UAV, as hobbyists call them — operated by Andreas Ostermann.

And with a few hundred dollars and some practice, you can make breathtaking aerial videos, too.

“It is the closest thing to flying like a bird,” said Ostermann, an aerial-photography hobbyist who […]

This post was originally published on this site