Tags: dellRemove, linuxRemove, notebookRemove

New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Dell Australia boss resigns 
By Steven Kiernan | Jun 10, 2014 | Comment Now 
Replaced by Angela Fox.
 
China looks to Linux as Windows alternative 
By Juha Saarinen | May 27, 2014 | Comment Now 
Linux developers push for official support.
 
Simple Ubuntu 14.04 lock screen bypass discovered 
 
Tech giants' wage cartel went beyond Silicon Valley 
By Juha Saarinen | Mar 24, 2014 | Comment Now 
Widespread agreement to drive down salaries.
 
Hundreds of infected Linux servers in Australia 
By Juha Saarinen | Mar 20, 2014 | Comment Now 
Windigo spreads spam and malware.
 
Microsoft earns kudos in Linux conf keynote 
By Juha Saarinen | Jan 10, 2014 | Comment Now 
Google and Apple? Less so.
 
Server vendors named in NSA spying toolkit 
 
Dell, others named in NSA spying program 
By Brett Winterford | Dec 31, 2013 | Comment Now 
30c3 keynote offers insight into next NSA leaks.
 
Server market declines as shift to cloud gathers pace 
By Juha Saarinen | Dec 6, 2013 | Comment Now 
HP takes number one spot worldwide.
 
Linux worm targets 'internet of things' 
By Danielle Walker | Dec 4, 2013 | Comment Now 
Exploits PHP vulnerability.
 
Linux worm infected internet-enabled home devices 
By Danielle Walker | Dec 4, 2013 | Comment Now 
The worm, called "Darlloz," exploits a PHP vulnerability to spread amongst Linux users.
 
Jolla Linux-based smartphone launches 
By Juha Saarinen | Nov 28, 2013 | Comment Now 
Mid-range hardware.
 
Hands on with OpenStack 
By Dez Blanchfield | Nov 18, 2013 | Comment Now 
iTnews' pre-shrunk OpenStack test-bed.
 
Linux backdoor stole company logins 
By Danielle Walker | Nov 17, 2013 | Comment Now 
Fokirtor trojan discovered.
 
Dell responds to 'cat pee' laptop stink 
Nov 1, 2013 | Comment Now 
Replaces components.
 
Dell goes private 
Oct 30, 2013 | Comment Now 
To delist today.
 
South African schools forced down Microsoft path 
By Juha Saarinen | Oct 11, 2013 | Comment Now 
Walking away from open source.
 
Reveton ransomware switches exploit kits from BlackHole to WhiteHole 
By Danielle Walker | Oct 10, 2013 | Comment Now 
But author's arrest to have a 'negligible impact' on the black market.
 
Gameover trojan hides in SSL 
By Danielle Walker | Oct 8, 2013 | Comment Now 
Variant detected on 250,000 infected computers.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 490

Vote