SSD Security Issues Surprise Experts

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

SSD Security Issues Surprise Experts


SSD Security Issues Surprise Experts

Posted: 07 Mar 2011 08:15 AM PST


Many storage and security experts were surprised by a UC San Diego study that found that solid-state drives are harder to erase than hard disk drives.

After attacks, Google vows to fortify Android Market

Posted: 07 Mar 2011 02:17 AM PST


Google will build new safeguards into Android Market, its application store for the Android mobile OS, following an attack that infected thousands of phones and forced the company to wipe the malware remotely from phones, it said late Saturday.

Wells Fargo says no to personal smartphones and tablets, period

Posted: 07 Mar 2011 02:00 AM PST


Wells Fargo imposes strict regulations on employee-owned mobile devices and social networking sites because of security risks.

Hackers targeted French gov't computers for G20 secrets

Posted: 07 Mar 2011 01:51 AM PST


IT staff spent the weekend in a massive clean-up operation to remove traces of a "spectacular" attack on computers at Bercy, the headquarters of the French Ministry of Economy, Finances and Industry, a government minister said Monday.

WordPress: DDoS attacks came from China

Posted: 06 Mar 2011 10:00 PM PST


The large distributed denial of service (DDoS) attacks that hit the WordPress.com blog publishing platform last week originated from China, according to the founder of the site.

New security tools protect virtual machines

Posted: 07 Mar 2011 08:00 AM PST


As enterprises move towards virtualizing more of their servers and data center infrastructure, the security technologies that are plentiful and commonplace in the physical world become few and far between.

How We Tested Virtualization Security

Posted: 07 Mar 2011 08:00 AM PST


We did not test performance. We concentrated on what it took to setup new policies, hosts, reports, and user roles in each product, and how the various parts of each product worked to protect a typical multi-host ESX installation.

0 comments:

Post a Comment