Search Results:
16-30 of 8297 results

Google Drive abused in malware attack, says security firm

Document uploads are thought to be part of a profiling strategy.

Security

Published 23 October 2014

McAfee launches security suites for SMBs

Devices from Microsoft, Apple and Google all covered for the little guys.

Security

Published 23 October 2014

Cyber weapons hold ‘no taboo’ for states

Ex-NSA lawyer outlines vision of cyber war.

Security

Published 22 October 2014

Open source bugs infest enterprise apps

Almost all IT groups expected to use open software components by next year.

Security

Published 22 October 2014

Half of UK victims don't care about cybercrime

Cost of online fraud to UK said to be £670m.

Security

Published 22 October 2014

Huge DDoS attacks on the rise

Anonymous attacks predicted as Guy Fawkes Day approaches.

Security

Published 21 October 2014

EFF bolsters mass phone surveillance dispute

Filing appears prior to December appeal against US government snooping.

Security

Published 21 October 2014

Kickstarter suspends fund raising anonymous router after backslash

Anonabox reportedly raised over $600,000, far more than its target of $7,500.

Telecoms

Published 21 October 2014

Phishers target emails with fake invoice spam

PDF file abused to download info scraper onto victim's machine.

Security

Published 21 October 2014

Huawei tests IMS based VoLTE international roaming call

The call was made between Europe and Asia using Huawei’s solutions.

Networking

Published 20 October 2014

Samsung teams with SK Telecom on 5G technology research

5G network connects over an ultra high performance network.

Networking

Published 20 October 2014

Banking malware targets Adobe products

Reader and Acrobat bug facilitates man in the middle attacks.

Security

Published 20 October 2014

Black market trade in personal data hits new record

Number of login credentials far outstrips payment card information.

Security

Published 20 October 2014

Dropbox shuts down phishing scam

Symantec warns that users may not understand SSL security.

Security

Published 20 October 2014

5 best VoIP phones for business

The phones to look at for your call centre and office needs.

Desktops

Published 20 October 2014

16-30 of 8297 results

Join our network

755 people like this.
0 people follow this.

CBR Supplier Recommendations

See more

CBR White Paper Recommendations

  • 10 reasons to deploy WAN optimization in an economic downturn

    03 November 2010 | By Teneo

    It’s no secret that companies often look to cut IT budgets in times of economic difficulty. But as McKinsey Consulting recently reported, it doesn’t make sense to do across the board IT budget cuts. Instead, the business should still make targeted investments that actually cut costs and prepare for the future. CIOs who take this advice to heart can present their board a strategy that delivers savings today and greater opportunity in the future. Why wait? Putting off the deployment of WAN optimization means savings and opportunity lost for the business....

    White Papers
  • Extreme savings: cutting costs with wide-area data services

    03 November 2010 | By Teneo

    Organizations of all sizes strive to be more productive and run low cost operations. Particularly in difficult economic times, many organizations will evaluate various cost-cutting initiatives in order to weather the storm. Ideally, organizations should not make deep cuts in investments that may jeopardize future growth, such as product improvements or hiring of key personnel.This paper explores how enterprises can use Riverbed solutions to cut hard costs and make the most of their existing infrastructure, without negatively impacting their operations....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.