Feeds

Political hacking scandal hits Hungary

Making a goulash of security

Secure remote control for conventional and virtual desktops

A "Watergate-style" political scandal has broken in Hungary after the opposition party was forced to admit an over-zealous intern was responsible for hacking into the servers of the governing party. Fidesz said the hack against the systems of the ruling socialist party, ahead of the April general elections, was not sanctioned by the party's leadership but, nonetheless, conceded it was a serious breach of electoral etiquette.

"Whichever one of our enthusiastic staff did this committed a serious mistake, but the world will not come to an end," Fidesz campaign chief Antal Rogan told Hungarian TV last week, AFP reports. Nearly 3,000 items of campaign literature were downloaded from its secure server, according to the government. The intrusion was traced back to an IP address belonging to Fidesz.

Hungarian police have launched an investigation. Socialist president Istvan Hiller says he wants to discuss the attack with Fidesz leader Viktor Orban. ®

Remote control for virtualized desktops

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.