VMware acquires Shavlik Technologies
VMware has entered into a definitive agreement to acquire Shavlik Technologies, which provides a portfolio of on-premise and SaaS-based management solutions that enable SMBs …
Trojan paves way for rogue defragmenter
You might have heard about rogue AV solutions and scareware, but not many people have experienced a rogue defragmenter that hides files and (indirectly) asks money to return …
Wikipedia-like sites peddling fake pharmaceuticals
Wikipedia is practically a household name now, so it’s no wonder that spammers are trying to take advantage of the online encyclopedia’s popularity and (relative) …
iPhone-enabled wireless multimeter
Redfish Instruments introduced the iDVM Digital Multimeter which wirelessly connects to an iPhone, iPad, or iPod Touch via an ad hoc wireless network allowing users to …
Breaches drive enterprises to prioritize access governance
Aveksa announced the findings of a recent survey conducted to examine how companies are re-evaluating their IT security measures following the recent security breaches at …
Portable biometric fingerprint scanner for iPod touch
Fulcrum Biometrics announced its FbF mobileOne fingerprint biometric accessory and companion app are now available for iPod touch. FbF mobileOne is the world’s first …
Hackers steal, publish Fox employee passwords
A group of attackers who clearly have it in for Fox Broadcasting have managed to access a company server with hundreds of their employees’ email usernames and passwords. …
Obama administration reveals cybersecurity plan
The Obama administration has issued a new legislative proposal that contains a number of steps it thinks critical to improving cybersecurity for U.S. citizens, the …
First mobile wireless storage for iOS
Seagate announced GoFlex Satellite mobile wireless storage, the first battery-powered external hard drive to wirelessly extend the storage capacity of any Wi-Fi enabled mobile …
PC Lock protects from identity theft, privacy invasion
Laplink released PC Lock, data encryption software with cloud management. Its Web Management Console lets users modify preferences, change settings, reset passwords, lock the …
PSN attackers allegedly used Amazon cloud for attack
Attackers (mis)used the Amazon cloud to mount their attack against Sony’s online services and systems, and they did it legally, says Bloomberg. According to an unnamed …
Unattended Linux VM configuration tool for Hyper-V
Set-LinuxVM is a tool provided as a Windows PowerShell module which is able to create Linux Virtual Machines on a Hyper-V host. It supports Debian, Ubuntu, CentOS, Fedora, …