Return to the The Data Chain website homepage

Blog

Archive for June 2012

It Is Official: Microsoft Acquires Yammer. What Does It Mean to the Industry and Moxie Software?

25 Jun 2012

Tom Kelly writes: In the past days, I’ve been asked by industry peers and the media to provide my thoughts around Microsoft’s acquisition of Yammer. Since the deal was formally announced today, I wanted to further elaborate on my views, providing additional insights about the impact of the acquisition to the industry and to Moxie Software.

Read blog post

A La Carte: Criminals Charging Per Feature for Custom Webinjects

25 Jun 2012

Trusteer's Amit Klein writes: Over the past several months, Trusteer has written about the evolving underground market for webinjects. Our researchers recently discovered a new development -- criminals are now selling customized webinjects that are priced per feature. For example, one seller offers a webinject for Zeus/SpyEye that contains the automatic transfer system (ATS) that was reported by Trend Micro researchers last week.

Read blog post

Say Goodbye To Data Center Downtime

21 Jun 2012

James Young at CommScope writes: There’s a quiet revolution going on in your data center. Labeled Data Center Infrastructure Management (DCIM), it represents what can be achieved when IT and dataf center facilities functions converge. Properly done, DCIM can take energy efficiency to the next level, optimize physical equipment layouts, improve strategic planning and enhance resource availability.

Read blog post

LinkedIn and eHarmony: a lesson in online identity via email

17 Jun 2012

Orlando Scott-Cowley writes: Late last year I wrote about how important an email address is, and suggested that your email address is really part of your identity. That post seems more relevant today than when I wrote it, as this week we learn that both LinkedIn and eHarmony have had user credentials stolen.

Read blog post

Why code signing matters

07 Jun 2012

Mark Knight, Director, Product Management at Thales e-Security writes: 

Code signing has been a popular topic over the last fortnight.

  • Yahoo was quick to patch an embarrassing key management error with the signing key used in their new Axis browser extension for Chrome that was discovered by Security blogger Nik Cubrilovic [1].
  • Microsoft has published [2] a security advisory revoking trust in a number of digital certificates that may have been abused to sign parts of the recently discovered “Flame” malware.
Read blog post
Server Tech (sentry)

Mailing list




Copyright 2010-14 The Data Chain Website design and management by CBJ Digital Ltd.