Data Leak Vulnerability In Android Gingerbread
Google's Android Gingerbread (version 2.3) operating system is affected by a data-leak vulnerability that is very similar to a vulnerability in an earlier version that was supposed to have been fixed.
Backup Deduplication 2.0 Needs Better RAID
As we wrap up our series on what is needed in the next generation of backup deduplication devices, one of the key needs is going to be a better drive protection capability. Today most deduplication systems leverage RAID to provide that drive protection, however as capacities increase, RAID rebuild times are going to get worse. Vendors need to provide a better solution.
Trend Micro Unveils IBM Security Suite
ScanMail Suite for 64-bit Lotus Domino platforms uses a cloud-based database to detect threats, including those generated by URL-shortening services recently linked to the spread of malware.
Sony Wins Restraining Order Against Hacker
George Hotz, who gained notoriety by hacking the iPhone, was barred from distributing, creating, or marketing his technology for running unauthorized software on the PlayStation 3.
Russia To NATO: Investigate Stuxnet
The Stuxnet worm is alleged to have set back Iranian's controversial uranium enrichment program significantly. Now, the Russians are asking NATO to find some answers.
Deduplication 2.0 - Recovery Performance
"It's all about recovery", you'll here it in almost every sales presentation by a backup vendor. That advice holds true for backup deduplication devices as well. A common mistake is to assume that because deduplication products, most often disk based, that they also offer the best recovery performance. This is not always the case and as we move into the next dedupe era it has to improve.
Twitter Worm Unleashes Fake AV Attack
Google's goo.gl link shortening service, as well as code obfuscation with RSA public key cryptography algorithm are spreading malicious links via a bogus antivirus campaign.
DoD, NATO Huddle On Cybersecurity
Deputy secretary of defense William Lynn is building a partnership on cyber defense with NATO and the European Union in meetings in Brussels.
Facebook Defends Security Practices
The social network responds to report alleging it puts the safety of its 650 million users at risk by not better securing third-party applications.
WikiLeaks Targeting P2P Networks?
That is the allegation in a news report that ran last week. While the outcome from the investigation could have a profound impact on whether the anti-secrecy organization is a media outlet – there is a bigger lesson.
How Careful Do You Need To Be With Cloud Storage? - Security
Developing a cloud storage strategy is moving to the top of many IT managers project lists. How to use cloud storage and what applications or processes could benefit the most from the use of cloud storage are key questions to answer. One mantra that keeps coming up is "you have to be careful" with cloud storage rollouts. Really? What makes cloud storage so risky that it requires this extra caution?