UPCOMING WEBINAR: >On-demand Event
Many IT organizations are re-thinking the way they develop and deploy applications so they can more easily meet the demands of their business and the expectations of their customers. For an increasing number of these organizations, this means the adoption of a DevOps strategy to help streamline the application development process. There is one significant obstacle, however, that prevents these businesses from realizing the benefits of DevOps, and that's their database development.
The database has become the bottleneck in DevOps because many development organizations lack the necessary processes and tools to make database changes as applications are deployed. Watch this webinar with Oracle expert and Toad Product Manager John Pocknell to better understand how the right tools can help streamline the database development in your organization, so it moves as smoothly and efficiently as the rest of your DevOps-enabled processes.
Watch this event to learn how to:
- Shorten your database development cycles without compromising quality and performance
- Integrate code quality reviews and functional code testing into your Continuous Integration workflow
- Work smarter and become more agile by delivering code 40% faster
Unleash Your DevOps Strategy by Synchronizing Application and Database Changes REGISTER >
Trend Micro researchers are warning of a new Trojan that uploads Word and Excel files from victims' computers to the file hosting site SendSpace.
"If you browse SendSpace, there's a chance you might come across Microsoft Word and Excel files stolen directly from victims' computers and put up for grabs," writes SecurityNewsDaily's Matt Liebowitz. "A new, sophisticated Trojan, identified by the security firm Trend Micro as 'Tspy_Spcesend.A.' may be the culprit behind the pilfered documents and spreadsheets."
"After finding and harvesting your private files, 'The collected documents are then archived and password-protected,' Trend Micro's Roland Dela Paz explained," Liebowitz writes. "The files are stored in the user's temporary folder, and that folder is then sent to SendSpace, and the link (including a password to unlock the stolen files) is sent to a command-and-control server run by the cybercriminals."
Go to "New Trojan Automatically Uploads Stolen Files to SendSpace" to read the details.
For regular security news updates, follow eSecurityPlanet on Twitter: @eSecurityP.