However, the leak of the product's source code could theoretically pave the way for the identification of other vulnerabilities. An analysis of the leaked pcAnywhere files and documents performed by an anonymous researcher and published Friday by the InfoSec Institute concluded that the application has not changed much over the years. The current version is probably a continuation of the old code base instead of a rewrite.
Discover why 40/100 GbE matters in an IT landscape of increase virtualization and why it is rapidly gaining traction as a key foundation for building the next generation of virtualized data center and campus environments. Understand why it holds the...
Different policies and security processes can often be confusing and frustrating, especially when different devices are involved in the equation. Unified access allows an organization’s wired and wireless to function as one network.
The high speed of flash storage often makes it easy to justify its high price. But with Dell's new approach to flash tiering, that justification may no longer be necessary. Though the latest release of Dell's Compellent Storage Center includes new...
A new survey reveals a nearly unanimous belief among respondents that their company websites are at mid-to-high risk of being targeted by DDoS attacks over the next 12 months. Released by Prolexic, provider of Distributed Denial of Service (DDoS...
A new study reveals the continuous preference by Asia Pacific consumers for multichannel communications in customer service, with video emerging as a new customer service channel, and social media continuing to grow and deliver great customer...