The content has been shared, if you want to share this content with other users click here.
Argentine computer services consulting firm C&S has expanded operations to Chile and Costa Rica, C&S said in a statement.
To support its expansion efforts, the company has also launched a new brand identity, including a logo and new marketing strategies.
The new brand identity is driven by a set of projects in training, development, strategy and business expansion in the company, according to C&S president Norberto Cannigia.
Latin American security services provider Soluciones Orión has been recognized as partner of the year by international internet security solutions provider SonicWall, the former said in a statement.
Soluciones Orión was recognized in the managed service provider category in Latin America for its experience and the number of projects developed during the 10 years the firms have been working together.
In Latin America, Soluciones Orión has presence in Argentina, Chile and Colombia.
South African IT services provider Dimension Data has achieved the Microsoft (Nasdaq: MSFT) Cloud Accelerate Partner status, Dimension Data said in a release.
The status, held by less than 1% of Microsoft partners around the world, combined with Dimension Data's existing Microsoft Hyper-V Private Cloud partner status, reinforces the group's position in providing clients with architectures and roadmaps for adopting cloud computing.
In Latin America, Dimension Data has presence in Brazil, Chile and Mexico.
Slovakian antivirus and security software developer Eset has detected a new version of the Linux/Tsunami Trojan for Mac OS, a code originally discovered in 2002, Eset said in a statement.
The threat has internet relay chat (IRC) controlled backdoor that causes the infected machine to become a bot for distributed denial of service (DDoS) attacks.
In addition to enabling DDoS attacks, the backdoor allows a remote user to download files such as additional malware or updates to the Tsunami code. The malware can also execute shell commands, giving it the ability to essentially take control of the infected machine.