Enterprise

An international botnet could be using infected Android handsets to send out massive amounts of spam, said Microsoft antispam engineer Terry Zink. He reportedly identified the botnet and its Google Android connection by examining the headers of spam that included the signature "Sent from Yahoo! Mail...

Samsung's forthcoming Galaxy S III smartphone will be the company's first device to be officially branded and sold under its new SAFE program. SAFE stands for "Samsung Approved for Enterprise." The Galaxy S III will be available in the U.S. from Verizon Wireless, AT&T, Sprint, T-Mobile and U.S.

Just when you thought it couldn't top itself -- having contributed Linux kernel code under the GPL, broadly supported Linux alongside Windows with its systems management and other software, and spun off a new subsidiary dedicated to openness, Microsoft showed yet more Linux and open source love rece...

Linux Administration: A Beginner's Guide by Wale Soyinka is a hands-on manual for IT staffers who must dance with Windows and Linux. It is a practical guide for network admins who deploy and maintain Linux and other free and open source software. In this Sixth Edition opus, Soyinka provides an exten...

Amazon Web Services has teamed up with private cloud infrastructure provider Eucalyptus in a move that could enable the deployment of hybrid clouds. Hybrid clouds are a combination of internal private clouds and external public clouds. Under the agreement, AWS will support the integration of privat...

The government of Iceland recently launched a one-year migration project for all its public institutions in what appears to be an acceleration of its movement toward free and open source software and away from proprietary systems, according to the European Commission blog Joinup. The project will ap...

Similar to Apple's iOS, Android is apparently vulnerable to apps secretly copying photos. Android developer Ralph Gootee created a test app that masquerades as a simple timer but steals the most recent image on the user's smartphone and posts it on a public photo-sharing site. Critics said the devel...

Antivirus vendor Symantec announced recently that up to 5 million Android devices may have been infected with a particular type of malware. Multiple publishers were pushing out apps -- some of which were found in the official Android Market -- containing malware known as "Counterclank," according to...

As Android continues its breathtaking rate of growth, malware directed at the platform is keeping pace. Studies from McAfee and other antivirus software providers warn that Android is a breeding ground for malicious software. Google has come under fire as a result, with security experts pointing to ...

OPINION

Top 5 Linux Predictions for 2012

Linux continues to grow both its reach and credibility among enterprise IT users and customers, bringing competition, price and time-to-market pressure and options to key markets such as cloud computing and mobile software. Looking at the coming year for Linux, these are the key areas to watch: clou...

EXPERT ADVICE

Open Source, Abundance and Open Innovation

Open source and innovation are locked in a dynamic and symbiotic relationship. Open source, community-based development evolved to meet developer needs for access and openness. While early open source represented innovation in development processes -- and, of course, was enabled by the emergence of...

The proliferation of smartphones has created headaches for security-minded IT departments everywhere, but a Motorola subsidiary aims to give system administrators more peace of mind with a solution for managing Android phones in business environments. Three Laws Mobility, purchased by Motorola eight...

In a move to expand its enterprise cloud storage capabilities, Red Hat will spend $136 million to acquire Gluster, a storage company that builds management tools for data centers and cloud services. The companies announced the deal Tuesday, and the deal is expected to close by the end of the month.

That Was the Breach That Was

A series of intrusions into the heart of the Linux Kernel.org servers in late August that went undetected for some 17 days is still shrouded in mystery. If Linux developers know how the breach occurred, they are not saying. They also are keeping mum on the extent of any damage the break-in caused. T...

If you use Linux instead of Microsoft Windows, its free availability may well be a deciding factor. But the fact that virus and malware contamination are less likely to take down your Linux computers is no doubt an essential influencing factor as well. But does using a more popular Linux distro like...

LinuxInsider Channels