Hosting Discussion
// archives

Featured Posts

Chillers and fuel cells: the greening of the hosting industry continues
Tuesday, February 23, 2010
By Chris Redman
WebhostingDay 2010: dates, location, speakers
Tuesday, January 26, 2010
By Chris Redman
Web hosting socially and in the cloud in 2010
Wednesday, December 30, 2009
By Renee Hendricks
One man’s data loss is another man’s lesson
Tuesday, August 18, 2009
By Chris Redman
Questions you didn’t know you can ask potential web hosting providers
Wednesday, July 29, 2009
By Artashes Toumanov

Sponsored By:


This tag is associated with 1 posts

Steering clear of dangerous Olympic spam

With the opening ceremonies of the 2010 Winter Olympic Games in Vancouver, Canada now completed and the Games officially underway, security firm MessageLabs Intelligence has released information about the astounding number of cyber criminals attempting to spread malware in the name of the much-loved event, some with the intent to launch attacks on unsuspecting web […]

Hosting sector sees criminal intrigue

An American cyber-crime drama focused on the hosting industry has been unfolding this month with reports surfacing that the criminal parties have been arrested, bringing to a close a technological intrigue spanning two countries and a normally quiet sector of the technology industry.

Four people arrested in web hosting equipment fraud

4 people have been arrested due to a web hosting fraud, in which the conspirators gained computer racks and generators by making false representations. A total of 19 defendants were charged for conspiracy mail and wire fraud which lasted for more than 6 years.

TeliaSonera interrupts connection with Real Host

TeliaSonera, a Nordic telecommunications provider, has officially dropped its connections with Latvian-based Real Host. The decision was made after it learned about allegations on the web host company that its hosted sites are distributing botnet software. Among other suspicious activities are stealing credit card data and using an Adobe Flash vulnerability to infect computers of […]

Page 1 of 11