Nearly 80 percent of security products fail to perform as intended when first tested and generally require two or more cycles of testing before achieving certification, according to a new ICSA Labs report. The “ICSA Labs Product Assurance Report” - co-authored by the Verizon Business Data Breach Investigations Report research team - details lessons gleaned from testing thousands of security products over 20 years.
"...we are working with Indilinx on a firmware update to address performance degradation experienced by some users when they updated to the 1819 firmware. We have been promised a version to test next week. Our testing process will take approximately two weeks. We will post back with updates as we get them.
For Mac users, please be assured that many of us are Mac users as well, it is important for us to find solutions. We continue to work with the controller manufacturer to develop solutions. We do not have anything specific right now.
Microsoft on Friday said it is working on a fix for a vulnerability in the Server Message Block file-sharing protocol in Windows 7 and Windows Server 2008 Release 2 that could be used to remotely crash a computer. The software giant had said on Wednesday that it was looking at the bug, discovered by researcher Laurent Gaffi?, who published proof-of-concept code on a blog.
Google's Chrome operating system could mark a turning point in computing, but many questions remain. Today's rumor is the OS will be released to developers next week, answering some questions but probably raising even more. Google had previously promised Chrome OS, in some form, before the end of this year. Chrome OS strikes me as being just enough Linux to allow an underpowered computer to run Chrome browser and connect to cloud-based applications. How exciting can that really be?
While other operating systems in Microsoft's stable were given security patches yesterday there was one important one that was considered still fine to run. Most people expected a few things to be found wrong with the newly released Windows 7, however there were no patches for the operating system.
Yesterday was Microsoft's Patch Tuesday for the month of November. There are 6 new Security Bulletins this month: 3 rated as Critical and 3 rated as Important. Not all Critical Security Bulletins are created equally though. You need to understand the implications of the flaw being patched and how it applies to your systems to determine how urgent the update is.
Although Mozilla's Firefox 3.6 is still in beta, the CRN Test Center reviewers wanted to take a look at it because we measure the progress of a browser in development by doing a series of benchmark tests against each alpha, beta and final versions to determine whether there are performance improvements with each release. For instance, when we tested Firefox 3.6 Alpha 1, we were pretty impressed with the benchmark results.
Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography. Heinous pictures and videos can be deposited on computers by viruses — the malicious programs better known for swiping your credit card numbers. In this twist, it's your reputation that's stolen.
Pedophiles can exploit virus-infected PCs to remotely store and view their stash without fear they'll get caught. Pranksters or someone trying to frame you can tap viruses to make it appear that you surf illegal Web sites.
New BIOS updates released for the EVGA X58 motherboards. Get em while their hot!
Few terms have been as simultaneously hyped and reviled as "cloud computing," but there's definitely more to the phenomenon than just a buzzword and some vague talk of "efficiencies" and "agility." We've put together this short, simple introduction to cloud computing that you can send to your CIO the next time you catch him abusing "the cloud" at a meeting. There's a kind of supply-and-demand dynamic that applies to technical terms—when a few knowledgeable insiders are hoarding a word, it maintains its meaning, but when the masses get hold of it and abuse it, it's quickly emptied of value.
Copyright 2014 © Godem Online Inc. | Web and server solutions by NewTech Solutions.