Skip to main content
  • Home
  • Contact
  • Newsletter
  • Login
Home Home

Search form

  • Nike's M2K Tekno Gets A Volt Colouring - nike junior lightweight windrunner jacket black - Nike Vomero 18 Review: Bigger is Better
  • nike air jordan 1 mid outlet
  • Puma et Jeff Staple ont su nouer une solide relation durant ces dernières années , Buy & Sell Sneakers , AcmShops Marketplace
  • Buy now adidas SUPERSTAR PARLEY - adidas pro bounce louisville ohio football - GV7615
  • Pratica e fresca t-shirt
  • Insights
  • CASE STUDIES
  • Viewpoints
  • Products
  • Conferences
  • Slideshow
  • Videos
  • Contact us
Home Home

Search form

    • Insights
    • CASE STUDIES
    • Viewpoints
    • Products
    • Conferences
    • Slideshow
    • Videos
    • Contact us

New "11.6 hours" viral scam active on Twitter

New Delhi: Twitter users beware! If you get a message titled "I have spent 11.6 hours on Twitter. How much have you?" do not click on the included link even if it is from someone you know on Twitter as it is a malware application.The scam seems to be spreading, despite the fact that the linked application, called "Time on Tweeter", ? but that may changed by the attackers actually requires you... By

SMBs in India not prepare for Disasters

New Delhi: Symantec has announced the India findings of its 2011 SMB Disaster Preparedness Survey, which measured the attitudes and practices of small- and mid-sized businesses (SMBs) and their customers toward disaster preparedness. The survey findings show that though SMBs in India are at risk, they are still not making disaster preparedness a priority until they experience a disaster or data... By

Major risks of social media for business

Bangalore :Companies are changing the way they interact with their customers and potential audience. Traditional systems are evolving into a collaborative environment where a dialogue with the community. According to the 1st Annual Risk Index Social Networks of SMEs , published by Panda Security , The Cloud Security Company, 78% of companies surveyed use social networks as tools to support... By

Samsung to introduce 8.9" tablet

New Delhi: Samsung is about to release the third in its line of Galaxy tablets. The next tablet in line is a 8.9 version of the tablet., previously Samsung launched a 7" version (hands-on) and announced a 10.1" version during MWC 2011, which is yet to release.While the first tablet used a 1 Ghz single-core CPU and ran Android 2.2, the second uses a Tegra 2 dual-core 1 GHz CPU and will run... By

Google buys Zynamics

New Delhi: Founded in 2004 by CEO Halvar Flake (Thomas Dullien), Zynamics builds reverse-engineering tools for offensive and defensive security that help find security vulnerabilities within applications. According to Zynamics, its tools can be used to help understand security updates, identify FOSS (free and open-source software) code in binaries, and identify flaws in closed-source software... By

Writing vendor requirement to avoid the pain

You know you have an issue, you talk about the issue, you think up a technical solution, you ask around about various vendor offerings, you read some marketing literature; you may even listen to a vendor give a short product pitch. The solution sounds good, so you buy it, plug it in, then watch it fall short of pretty much every expectation you hadOkay, so maybe this isnt an exact scenario youve... By
News

Bug erases 150,000 Gmail accounts

New Delhi: Less than a percent of Gmail users woke up to a fright this morning, when they experienced a blank inbox and a Welcome to Gmail message awaiting them when they logged on. After the first of these users aired their plight on the Gmail Help Forum, Google estimated that approximately 500,000 Gmail accounts were reset, with about as many users losing their entire cache of mails, chats,... By
News

Optical Components market to score 15% growth

New Delhi: Ovum forecast the 2011 growth for Optical Components (OC) to be 15% and our long-term outlook is for multiple sequential years of double-digit growth. The demand for higher bandwidth in the network core, in access, and in datacom networks and the demand for network agility are driving growth in this forecast. The CAGR is 16% for 2009 through 2015 and the market is forecasted to... By

Why your social media efforts are failing?

New Delhi: Many social media efforts are failing, because some enterprises just don't understand how to employ social media to facilitate collective behaviors, says a recent Gartner report. The research firm conducted a 10 month effort collecting data and analyzing 200 successful social media implementations to identify how enabling collective human behaviors can lead to enterprise value."Social... By
News

Amazon launches cloud computing tools

New Delhi: Amazon Web Services, an Amazon.com company, has announced AWS CloudFormation, a simple way for developers and businesses to create collections of related AWS resources and provision them in an orderly and predictable fashion. With these tools, customers can create their own templates to describe the AWS resources required to run their application. AWS CloudFormation then manages the... By
News

The Changing Cyber Landscape

The cyber landscape is quickly evolving from hacking by teenagers to nation-sponsored cyber crime. As a result, in the next decade, we will face new cyber security issues and trends. To cope with these more complex and powerful cyber threats, organizations must shore up their existing cyber defenses to protect and mitigate these malicious attacks with a combination of security software and new... By
News

Panda Security introduces security solution

Bangalore: Panda Security has announced the launch of its security product for the Indian market, Panda Internet Security for Netbooks, which will be available in more than 23 languages for worldwide users. Panda Security, the worlds leading provider of cloud-based security solutions,Panda Internet Security for Netbooks allows the use of the netbook more efficiently for any offline or online... By
  • ‹ previous
  • …
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • …
  • next ›

Search form

MAGAZINE

IT Next_March-April_2024 (1).pdf

Most Popular

Can lawyers be automated? - CIO&Leader

Can lawyers be automated?

Apr 20, 2020

CSO Forum Mid-Year Summit

Aug 05, 2014

JUST IN

From UPI to DPI: India's emergence as a global digital influencer

G20 presidency has provided India with just the right opportunity to showcase its success in driving economic growth through digitalization. But it is doing that responsibly, taking an inclusive...
Sep 07, 2023
9,370
0

Recent Content

Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma

JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker

AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation

ITNext
X
IT NEXT
  • Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma
  • JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • Trend: Generative AI ++
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
CIO-LEADER
  • Hexaware Launches Amaze® for Modernization in AWS Marketplace
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
  • Kyndryl to Rev Mainframe App Modernization for Customers with AWS
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Badar Afaq Starts A New Position As Group Head IT At KCT Group
MORE STORIES FROM CIO&LEADER
CSOForum
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Embracing Innovation in Cybersecurity: A 2023 Outlook on Combatting Digital Threats
  • Cisco Unveils Business Performance Insight and Modern App Visibility on AWS
  • AI & its Implications on Information Security
image
  • ABOUT US
  • 9.9GROUP
  • CONTACT US
  • TERMS
  • SITE FEEDBACK

LET US CONNECT

Copyright © 2019-20 9.9 Group Pvt. Ltd.

All Rights Reserved.

Get Newsletter

Stay informed on our latest news!

CAPTCHA

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

4 + 13 =

Get Magazine