Feeds

Terrorists target offshore call centres

Offshoring gets dangerous...

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

A terrorist cell busted by Indian police was planning attacks on leading software firms in Bangalore.

Three men were shot dead and two arrested in southwest Delhi on Saturday. Indian police claim the men were members of Lashkar-e-Toiba - a Wahabi militant group fighting for an independent Kashmir.

Police found documents suggesting the group visited Bangalore in November last year and were finalising arrangements to rent a house there. The group had a detailed map of the offices of one firm, according to the Star of Mysore.

Apart from maps of call centres police also recovered 100 kilos of dynamite, 10.5 kilos of RDX explosive, 450 detonators, three AK-56 rifles and a satellite phone.

More details on Sify.com here.

Three people were charged in London today with conspiring to provide money to Lashkar-e-Toiba.®

Related stories

IBM shunts NTL tech support jobs to India
IBM exports Liverpool jobs to India
Tesco offshores 400 IT jobs to India

Beginner's guide to SSL certificates

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.