Tech news for NZ's largest enterprises
These search results are from across the Techday Network of sites
Malware targets Microsoft Outlook
<p>Users of the Microsoft Outlook email program are being warned about the rapid spread of malware specifically targeted at users of that program.</p>
Security patches for Adobe Reader, Acrobat
<p>Adobe has issued updates for its Adobe Reader and Adobe Acrobat tools, which are widely used for reading and sharing PDF files.</p>
The Beginner’s Guide to Flash Games
<p>It’s no secret that the Internet is a great place for gamers.</p>
McAfee’s “fascinating” year
<p>2009 was a year when spam, malware and other Web-based threats reached record levels, according to the third-quarter report from security vendor McAfee.</p>
More security woes for Adobe
<p>Another security vulnerability has been found in Adobe products – this time affecting Adobe Reader and Adobe Acrobat.</p>
Botnets ruled in 2009
<p>Botnets were the leading online security problem for 2009, and they’ll be smarter next year, to make it harder to take them down.</p>
Security fixes this week from Microsoft, Adobe
<p>Security updates are due this week from Microsoft, including a fix for a problem with Internet Explorer, and also from Adobe, addressing problems with its Flash Player and Adobe AIR.</p>
Pioneering spirit - Brian Eardley-Wilmot Interview
One of the best-known names in the New Zealand IT community, the twice-retired but- still-working Brian Eardley-Wilmot took time out of his busy work schedule to tell The Channel about some of the things that have earnt him his reputation as an industry pioneer.
The Internet's 2000s Top Ten
<p>The iPhone, social networking and YouTube are among the top 10 defining moments of the Internet in the first decade of the millennium, according to the people behind the online Oscars, the Webby Awards.</p>
The cold war in cyberspace
<p>There are growing signs that the world is engaging in a "cyber cold war", says a new report from security firm McAfee.</p>
It's alright for Right Hemisphere
<p>Kiwi company Right Hemisphere, whose clients number many Fortune 500 companies, has cemented a partnership with Mecanica.</p>
Renaissance gets gold from Adobe
<p>The company has been appointed as an Adobe Gold Channel Partner.</p>
Botnets thriving - report
<p>Botnets are now responsible for distributing 87.</p>
Adobe opens up NZ distribution
<p>After a thorough review of its New Zealand distribution strategy, Adobe has decided to allow Ingram Micro and Express Data, its two distributors, to sell the entire range of Adobe products.</p>
October Windows updates available
<p>Microsoft's monthly Patch Tuesday, when it issues online updates for its operating systems, has set a new record this month.</p>
Scareware on the rise
<p>Fortinet’s September report found a spike in the number of scareware malware and several new computer vulnerabilities.</p>
Microsoft Unveils Windows Mobile 6.5
<p>Microsoft has launched the new Windows 6.</p>
How to get the best from youtube: The web's video library
<p>YouTube isn’t the only site online where you can share or find online video, but it remains the most popular, with more than 10 hours of video uploaded to the site every minute.</p>
THE WAR ON FILE SHARING
<p>As the legal battle over the Swedish file-sharing site The Pirate Bay rages on, so does the backlash.</p>
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?