- Security
WIN32/OLMASCO.R, Youngest Malware TDL4 Families
After appearance of the newest version last July, where TDL at that time had been detected by ESET and known by Win32/Olmarik, seems still evolving. ESET researchers specifically examined and traces TDL 4 malware consistently, and in that time period, there are phases of the appearance new variants TDL 4. Latest phase is identification of appearance new variants malware Win32/Olmasco.R TDL 4 which has been developed in some parts, especially…
Read More » - Security
TDL 4, Dangerous TDSS Botnet Generation 4
TDSS botnet is now come with latest of 4th generation variant, which is more dangerous. Malware that spreads widely through the Internet and other devices such as flash disk is no longer an application that came once and then dies. Malware is also regeneration by always appearing in new forms and variants that stronger, more sophisticated. TDL 4 is one of a botnet TDSS the 4th generation. The rise of…
Read More » - Information Technology
NetApp’s Guide For Choosing The Right Cloud Service Provider
NetApp provides some guidance in choosing IT-as-a-Service that can help alleviate challenges faced by companies, following the growth and enabling for faster business innovation. Guidelines in terms of cloud computing are also able to move IT from a large capital expenditure into operational expenditure which controlled, that’s why choosing the right cloud service provider becomes important. The first thing to understand is the reason why the company decided to outsource…
Read More » - Information Technology
Cloud Security that CIO Need to Know
According to Frost and Sullivan study at the end of 2010, mention that more than 70% of 10,400 information security professionals reveals that they are more challenged by the security issues which arise from the development of cloud computing and mobile devices. The CIO agreed that there is an urgent need to review the security of cloud-based technologies. The adoption rate of cloud computing is okay to continue to increase,…
Read More » - Uncategorized
Feel Richer by Using Straight Talk with Your Android Phones
This post brought to you by Straight Talk. All opinions are 100% mine. I totally agree that smartphones are very useful “on the go” since you have access to GPS-enabled maps, email and wireless web. What I’m not so keen on is the extra cost of wireless web/data access which most providers consider an “add-on” to their regular monthly plan. And if you choose to go with one of the…
Read More » - Gadget
Meizu M9, Smartphone from China with Froyo Android Operating System Modification
China mobile phones product is not always identically with mobile phones ‘crap’. Meizu is a manufacturer of mobile phone products from China, now issued smartphones Meizu M9 based on Android operating system. Packaged in an elegant white box, Meizu M9 coming complete with user manual, warranty card, and the data cable and charger heads. Meizu M9 with operating system Android 2.2 (Froyo) that have been modified by Meizu to Android…
Read More » - Personal Technology
Wacom Launches Three New Bamboo and Cintiq 24HD
Wacom this time presenting the Bamboo 3rd generation, where this multi-touch product comes with wireless capabilities, allowing users more flexibility in ideas and creativity. On the same occasion, by taking location at the Mandarin Oriental, Wacom also announced the presence of the latest Cintiq with 24-inch widescreen High Definition which intended for creative professionals who are looking for a digital drawing surface with a pen on the best screen. Attending…
Read More » - Internet
Simple, Smart and Strong from Avira 2012
In early October ago, Avira has announced the presence of Avira 2012 that carries focus on protecting security of home users, small business and enterprise. Major changes occurred in this 2012 version, especially the increase of user interface, installation process, and level of automation in detecting and virus/malware removal, as it also increases the performance of system resources as well as new virus/malware detection that not yet known. Simple With…
Read More » - Security
Watch out, Free iPad Bid, turns out a Trap Click!
Trend Micro identifies a trap click of cybercrime to Facebook users worldwide, one of them, in my country. In this case, the user is prompted to share and comment on the death of Steve Jobs to get the prize of thousands of iPad. This contest ends until October 10, 2011. This information has been detected spread by viral, and indirectly provide fraud for millions of Facebook users around the world.…
Read More »