Nokia Microsoft revolt brews with Plan B "manifesto" 
By Liam Tung | Feb 16, 2011 | Comment Now 
Report claims Nokia courted RIM too.
 
WordPress gets an overhaul with 'Thelonious' 
By Shaun Nichols | Jun 19, 2010 | Comment Now 
New template, management controls for blog platform.
 
iPhone multi-tasking on the cards: report 
By Shaun Nichols | Mar 15, 2010 | Comment Now 
4.0 update could allow multiple apps to run simultaneously.
 
Password reuse threatens online banking security 
By Iain Thomson | Feb 3, 2010 | Comment Now 
Data gleaned from four million PCs.
 
Open Cloud Manifesto member companies revealed 
By Shaun Nichols | Apr 1, 2009 | Comment Now 
The initial roster for the Open Cloud Manifesto was released on Monday, and many of the biggest names in the web services industry are conspicuously absent.
 
Amazon says no to Open Cloud Manifesto 
By Phil Muncaster | Mar 30, 2009 | Comment Now 
Cloud computing giant Amazon Web Services has become the latest big name to say it will not be joining up to the controversial Open Cloud Manifesto set to launch this week.
 
Microsoft expresses outrage at secret 'Cloud Manifesto' 
By Sylvie Barak | Mar 27, 2009 | Comment Now 
Microsoft has criticised a secret 'Cloud Manifesto' penned by Amazon, Google, IBM and others, on the ground that it was not written through an "open process".
 
Good web application security requires multiple approaches 
By Sumedth Thakar | Sep 9, 2008 | Comment Now 
With new PCI DSS mandates going into effect, web application security will get even hotter.
 
VMware delivers fixes for multiple flaws 
By Dan Kaplan | Sep 4, 2008 | Comment Now 
Virtualisation software maker VMware has disclosed 16 vulnerabilities across its product line.
 
Polymorphic chips have multiple 'personalities' 
By Robert Jaques | Jun 13, 2008 | Comment Now 
US computer scientists have created a way to design polymorphic integrated circuits that can rapidly reconfigure themselves with multiple functions..
 
Red Hat patches multiple ‘critical’ vulnerabilities in Linux 
By Negar Salek | Oct 23, 2007 | Comment Now 
Red Hat has patched nine vulnerabilities in its Enterprise Linux 5 kernel that could cause denial of service and unauthorised system access if exploited by a malicious attacker ...
 
Phishers spreading multiple hooks 
May 31, 2007 | Comment Now 
Financial services still primary target.
 
Multiple flaws detected in Cerulean Studios IM software 
By Fiona Raisbeck | May 4, 2007 | Comment Now 
Multiple vulnerabilities have been discovered in Cerulean Studios instant messaging software, Trillian, which could be exploited by a malicious attacker to steal personal data ...
 
Multiple flaws reported in IBM Lotus Domino products 
By Frank Washkuch | Mar 29, 2007 | Comment Now 
Researchers from numerous security vendors have reported multiple remotely exploitable flaws in IBM Lotus Domino products.
 
Cisco reveals multiple Clean Access flaws 
By Dan Kaplan | Jan 4, 2007 | Comment Now 
Cisco Systems has reported multiple privilege-escalation vulnerabilities affecting the networking giant's Clean Access software solution.
 
Mozilla Firefox seals up multiple flaws 
By Dan Kaplan | Dec 21, 2006 | Comment Now 
Mozilla has fixed eight vulnerabilities in Firefox that could lead to cross-site scripting attacks and the execution of arbitrary code.
 
Core Security: Multiple flaws in AOL messenger 
By Frank Washkuch | Sep 7, 2006 | Comment Now 
Users of AOL's ICQ instant messenger (IM) were warned this week of multiple vulnerabilities in their IM software.
 
Preventing multiple PII disorder 
By Illena Armstrong | Jul 7, 2006 | Comment Now 
I used to think I was the one and only Illena Armstrong. The sobering truth, though, is that there are likely quite a few more of me around nowadays — or, at least, there very ...
 
Software sales at risk with multiple core PCs 
By Fleur Doidge | Nov 30, 2004 | Comment Now 
Software prices could skyrocket to unaffordable levels for many users in coming years as computer hardware evolves to multiple core models, a Gartner analyst has claimed.
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1377

Vote