In the recent past, the website of the LA Times was compromised. At the same
time, the blog site of Seagate, a renowned hard disc manufacturer, was also
compromised. A closer scrutiny revealed that Apache web server program was
being used to host both sites. A module was found to be the trigger in both
cases. It allowed the insertion as well as the rotation of malicious iFrames.
These affected all the website pages hosted through the servers.
This particular iFrame is famed for redirecting users to other websites that
host exploit kits. This will particularly target "Blackhole" hence the user's
computer catches the malware.
The existence of this malicious software has been known for quite some time.
In fact, the information security community has even branded it
"Darkleech."The first time such an incidence took place was during the month
of August last year. This d... (more)
Understanding the Problem
The numbers-driven aspect of modern business operations makes working with
spreadsheets a nearly inevitable aspect of any business process. Whether
you're working through a budget, planning a new project, or tracking results
of a project in progress, it's almost certain that Excel or another
spreadsheet application will be at the center of your efforts.
Excel's centrality to the modern business also has its downsides, both in its
use and in its integration with other IT systems. If knowledge workers are
not familiar with all the options that this tool of... (more)
In these times of saturated app marketplaces, where thousands of Angry Birds
and Candy Crush clones duke it out with original apps that promise everything
from quick and easy dating to the ability to control your house's
temperature, it is harder than ever to make your app stand out and get the
attention it deserves. The rise of mobile devices and app stores has been so
meteoric that the rewards for a successful have never been higher, but the
fierce competition also means that it can be quite intimidating to put your
app out there into a sea of quality and chaff.
Luckily, ther... (more)
In recent times, cloud computing has played a dominant role in the industry.
Whether you feel positively or negatively about it, it is undeniable that
cloud monitoring, like any other component in your network, needs to be
monitored – perhaps more than any other. To more old-fashioned solutions
for monitoring, the cloud creates a number of obstacles: you do not have
ownership of its hardware, it is not run on your network and when problems or
glitches occur you have no control over them.
Today there is a wide range of utilities to help you to manage your cloud
computing, and the ... (more)
A simple definition of cloud computing is that it's a unique storage service
that involves storage of data and software. With cloud computing, the person
or company who enjoys the service is not fully aware of the location, storage
facilities or configuration of the system used to offer the storage services.
A good analogy to explain this concept is the regular power grid that
supplies power to homes and businesses. The end user who enjoys the services
is hardly aware of all the power generation and distribution devices and
components used to deliver the service.
Since its intro... (more)