Report Inverter for Excel is an add-in that enables you to convert text reports into a data table by using a true user-friendly interface....
Showing results 1 to 20 of 28
The world's largest social network suffered a "sophisticated attack" last month, apparently caused by a Java zero-day exploit that has since been fixed, but there is "no evidence" that user data was compromised.
Many organisations are sitting on masses of personal data they can't use without falling foul of data-protection laws. Anonymising the data is a way round the problem but doing that properly has proved tricky — until the recent release of new guidelines.
For big data to amount to a serious asset that business and operations can exploit, datacentres will have to take a long, hard look at infrastructure and architecture.
Intel sees potential in big data, but it needs help to exploit it.
Just days after most services for the PlayStation Network (PSN) were brought back online, it appears a new exploit has been discovered that allows hackers to change users' passwords with the data stolen during the break-in to the service last month.
With 2010 all but behind us, we take a look at the year that was from the eye of best (or worst) data breaches, blitz attacks and plain stupid security.
HP gets more than security benefits from ArcSight acquisition, it gets closer to comprehensive BI for IT
For me the real value for HP is in gaining a comprehensive platform and portfolio via ArcSight for total systems log management. Being able to manage and exploit the reams of ongoing log data across all data center devices offers huge benefits, even the ability to correlate business events and IT events for what I call BI for IT.
The company says it has fixed a hole that lets intruders bug calls and access other phone data with the latest release of its WebOS platform
A hole in the WebOS device allows phone calls and data to be recorded and sent to a hacker, while a separate flaw in Android could leak passwords and data
Apple has plugged an SMS flaw that would enable an attacker to take complete control over an iPhone.Researchers Charlie Miller and Collin Mulliner said at the Black Hat security conference that an attacker could use the SMS exploit to make calls, swipe data and send text messages.
Attackers are using rigged PowerPoint files to exploit an unpatched vulnerability in Microsoft's presentation software, according to warning late Thursday from the software maker.In a pre-patch advisory, Microsoft described the attacks as "limited and targeted," the kind of language that suggests it is being used to steal data from corporate or government networks.
Despite a huge and growing amount of "webby" online data and content, capturing and defining that data and then making it available to users and processes has proven difficult, due to differing formats and data structures. The usual recourse is manual intervention, and oftentimes cut-and-paste chores. IT departments are not too keen on such chores.
Microsoft has confirmed reports of vulnerability in Word that allows an attacker to exploit a system via the Microsoft Jet Database Engine, which shares data with Access, Visual Basic and third party applications.Microsoft in its advisory said the potential for attack is "very limited.
This current wave is really driven by line of business getting IT in their own hands. They’ve started using it, and that’s created the chaos, but chaos is created because there is a need. The best thing that’s happening now is acknowledging that line-of-business people need to do their own thing. We need to give them the tools, environments and infrastructure so they can do it in a controlled way -- in an acceptable, secured way.
Differing approaches to tackling data security by national regulators create weaknesses for criminals to exploit, says the EC's vice president
These nifty clients should go quite a way to making enterprise mobility far easier by allowing developers to exploit them with fewer interface and connectivity variables to manage. But the converged client still needs a back-end or middleware counterpart to help coordinate an enterprise's data, logic, and security needs. Sybase is hard at work on what may prove to be a game changer for such enterprise mobility middleware -- especially when coupled with a converged device such as the iPhone.
On today's podcast:Can Linux go mainstream? Adrian Kingsley-Hughes analyzes the five things the Linux community needs to know about users.
When the WMF exploit hit the wild and existing workarounds were tacky and the official Microsoft patch a week away, the DEP or Data Execution Prevention feature shined through when it was completely enabled and supported by NX or XD capable hardware. While NX and XD also support other operating systems like Windows 2003 Server with SP1, BSD, and Linux, the vast majority of users will use it through Windows XP SP2.
Some new approaches have emerged for reducing the risk of being affected by this exploit. One approach involves using Data Execution Prevention (DEP).
Malicious code is unearthed that can exploit a widely reported flaw in a popular Net protocol and possibly disrupt data transmissions, but experts say the risk of real world problems remains low.