The security vendor has seen an uptick in infections as well as command-and-control servers Cybercriminals are increasingly using the “Blackshades” malware program whose source code was leaked three years ago, according to an analysis by Symantec. Blackshades, which Symantec identifies […]
How to determine if your application is suitable for the cloud
We know by now that cloud computing offers significant benefits, but is it ready for mission critical applications? After all, failure of these applications can result in the failure of the business. According to a recent survey, concerns about security […]
Google’s Gigabit Internet: Not coming to a neighborhood near you
Unless you’re lucky enough to live in Kansas City, Provo or Austin When Google announced plans in 2010 to jump into the broadband business, the company received more than 1,000 applications from communities hoping to be selected for Google Fiber, […]
iPhone 6 rumor rollup for the week ending Nov. 15
iPhone big screen or big screens, curvaceous, and pressured Fortunately for the iOSphere, Bloomberg found a “person familiar with Apple’s plans” to spill the beans and provide a week’s worth of rumor cud-chewing over the iPhone 6 display. While many […]
Microsoft offers quick fix for Zero-Day vulnerability
Company issues stop-gap patch for vulnerability targeting TIFF image format Confirming reports of limited attacks in South Asia and the Middle East, Microsoft released a security advisory on Tuesday warning of a new vulnerability targeting the TIFF image format. Microsoft […]