12 Steps for Staying 1 Step Ahead of Online Security Threats

By Andrew Browne / TechNewsWorld

Pop-up windows are a common form of online advertising and often appear so quickly that users are caught offguard. However, some pop-ups, when clicked, trigger spyware that can cause serious damage to computers. That’s why it’s important to never click “agree” or “OK” to close a pop-up window, and only click on the red “X” in the corner or Alt + F4 to close it safely.

With the explosion of Web-based communications in the form of applications, blogs, podcasts, and social networking sites like Facebook and Twitter, new security threats that can cause serious damage to computers are emerging. As they access these Web-based services from both work and personal computers, many users are unaware that they may be exposing themselves and their organizations to risk. In this increasingly social and interactive world, organizations must take the necessary steps to strengthen their defenses and protect their online property. While the Internet continues to offer exciting new ways to collaborate more interactively, it is also introducing highly targeted threats to the mix. Continue reading

Windows 8 Server Core Promises Cheaper Clouds

By Paul McDougall / InformationWeek  March 21, 2012 

Stripped down version of Windows Server 8 aims to significantly reduce storage costs for organizations building private clouds.

Microsoft has enhanced Server Core in Windows Server 8 to make it more flexible and user friendly, and as a result the company says organizations can save thousands of dollars – or more – simply using the feature in their private could deployments.

Server Core is a stripped down version of Windows Server that includes only the bare essentials necessary for certain types of server roles, such as a DNS server or file and print server, that don’t require all the components included in Windows Server, such as a GUI and Internet Explorer. AdTech Ad Continue reading

Detect and prevent today’s sophisticated malware threats

By Dennis O’Reilly March 20, 2012 10:49 AM PDT

Internet thieves are more organized and more technically savvy than ever before as they concoct insidious software designed to let them separate you from your valuables. Users and ISPs must work together to keep them at bay. Today’s malware purveyor bears little resemblance to the outcast-teenage-loner caricature popular in days past.

Last November the FBI’s Operation Ghost Click led to the arrest of six Estonians charged with promulgating the DNSChanger malware, which the FBI claims allowed the gang to steal $14 million by manipulating the servers of online advertisers. Unfortunately, DNSChanger is estimated to have infected 100 million computers worldwide and 500,000 in the U.S., many of which haven’t yet been disinfected. Continue reading

Dell to Acquire SonicWall to Expand Network-Security Tools

By Beth Jinks March 13, 2012

Dell Inc. (DELL), the world’s third- largest maker of personal computers, agreed to buy SonicWall Inc. to gain network-security and data-protection tools, paying a price that analysts peg at between $1 billion and $1.5 billion. SonicWall, based in San Jose, California, had revenue of about $260 million in the past 12 months and about 950 employees, executives from both companies said today on a conference call to announce the deal. SonicWall’s technology detects and protects networks from intrusions and malware attacks, and helps protect data.

Dell is buying services and software businesses as the PC market faces competition from smartphones and tablets. Last month, the company hired CA Inc. Chief Executive Officer John Swainson to oversee the software push, and today he said security is an important part of that strategy. Continue reading