The vulnerability was reported Thursday to Oracle along with proof-of-concept (PoC) exploit code.
BYOD runs wild at most global companies
More and more workers around the world are bringing their personal mobile devices to the office daily, and companies appear to be having trouble keeping up with the trend.
SAP posts growth but lowers outlook in main software business
SAP reported revenue growth in the second quarter driven by growth in cloud subscriptions and revenue from support and its HANA in-memory database.
Apple looks to pick off engineers from Amazon, OpenStack to build out iCloud
Apple is on the hunt for cloud infrastructure engineers familiar with building large-scale deployments like those at Amazon Web Services and OpenStack companies, according to a job posting.
Why help desk employees are a social engineer's favourite target
A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal.
Most enterprise networks riddled with vulnerable Java installations, report says
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organisations.
The gift of foresight
Though Kamal Osman Jamjoom (KOJ) Group has not deployed what it believes to be the current number-one solution on the market to boost its HR processes for staff, the company believes that its roll-out of Oracle Fusion will prove a winning move.
Possibility in the privacy pitfalls?
Last month, a former CIA technician leaked information on the National Security Agency’s data gathering surveillance programme dubbed PRISM. Joe Lipscombe investigates what relevance this holds for the Middle East.
Cisco building an Internet of Everything router: Chambers
Cisco is building a router for the Internet of Everything, the company’s initiative to connect the billions of devices – or 99 percent of the world – that it claims isn’t already connected.
New Android malware lowers the bar for cyber-criminals
The first tools for injecting legitimate Android apps with open-source software that allows an attacker to control an infected smartphone remotely have been found in the criminal underground.
Microsoft fills Office Mobile hole with iOS Outlook app
In an odd bit of doublespeak, Microsoft has released a version of its Outlook Web App (OWA) as a native application for the Apple iPhone and iPad.
Calculating the cost of profit
Can you maintain cost leadership, service levels, solution quality, and deliver projects flexibly and to schedule? You’re worth your weight in gold, no doubt.
R&M warns Middle East against investing in under-developed tech
Swiss structured cabling specialist R&M has warned Middle East organisations against premature investments as long as standards are not defined and components are not fully developed.
Microsoft to update Windows Phone 8, minor changes
Microsoft has detailed the next software update to its Windows Phone 8 mobile operating system.
Oracle ups memory, storage of Exalytics analytics appliance
Oracle is introducing a new generation of its Exalytics appliance for high-speed data analysis that comes with a slightly higher price tag but major increases in memory and storage capacity.
On the fringe
With margins for traditional commodity gear at all-time low, partners are looking to the peripherals market to make up on lost revenue.
Oracle's Saggia gives tips on simplifying IT at CIO 100
High-growth countries are usually exhibited by a low per capita income. The upside, though, is that such countries, usually emerging countries, are able to do more with fewer resources.
Mobile malware, mainly aimed at Android devices, jumps 614% in a year
The number of mobile malware apps has jumped 614 percent in the last year, according to studies conducted by McAfee and Juniper Networks.
CommScope acquires Redwood Systems
CommScope has acquired Redwood Systems, which specialises in LED lighting solutions and integrated sensor networks for data centres and buildings, in a bid to deal with growing demands for full-scale intelligent infrastructure solutions.
Researchers find another Android attack that can get past signature checks
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.