1. The new urgency to fix online privacy

    Date: 10/31/07     Keywords: no keywords

    Unlike Y2K, which was a nonevent, Internet attorney Eric Sinrod explains why the business world is mobilizing behind what it sees as a real threat. A decade ago, I started writing about online privacy issues. At the time, legal colleagues told me that while they found the topic...

    Source: http://news.zdnet.com/2010-1009_22-6216061.html

  2. Bogus FTC e-mail has virus

    Date: 10/29/07     Keywords: no keywords

    Agency says fake e-mail is a "treasure trove for identity theft," warns recipients not to open it. The Federal Trade Commission, which has declared war on Internet scams, warned consumers on Monday not to open a bogus e-mail that appears to come from its fraud department because it...

    Source: http://news.zdnet.com/2100-1009_22-6215894.html

  3. Why we still invite data breaches

    Date: 10/29/07     Keywords: security

    Sentrigo's Dan Sarel writes that enterprise security has been slow to realize the evolving nature of for-profit cyber hack attacks. If you followed the news this summer, you doubtless read about a spate of data breaches reaching across corporate America. After a massive security compromise at...

    Source: http://news.zdnet.com/2010-1009_22-6215627.html

  4. Report: U.S. tops list of spam-offending countries

    Date: 10/26/07     Keywords: security, spam

    U.S. sends about 28 percent of the world's spam--more than five times as much as second-place South Korea, says security firm. The U.S. remains the world's biggest spammer, according to security firm Sophos, which on Friday released its quarterly report on the world's top spam-offending countries--dubbed the "Dirty...

    Source: http://news.zdnet.com/2100-1009_22-6215444.html

  5. Nothing like being a tech slave

    Date: 10/26/07     Keywords: no keywords

    Fed up groveling before your PC? You should be. Imagine an alternate universe where your TV forced you through the same daily humiliations. What if turning on a television were as difficult as working with your PC? That would be cyberhell. Computer scientist-philosopher Michael Dertouzos...

    Source: http://news.zdnet.com/2010-9584_22-6215389.html

  6. Security firm: Hackers can divert Vonage calls

    Date: 10/25/07     Keywords: security

    Hackers with a Vonage subscriber's name and number could intercept Net phone calls by exploiting a system weakness, according to a security firm. Hackers with a Vonage subscriber's name and phone number could intercept Internet phone calls by exploiting a weakness in the system, according to security firm...

    Source: http://news.zdnet.com/2110-1009_22-6215259.html

  7. Schneier: Beware security products

    Date: 10/24/07     Keywords: security

    Security expert Bruce Schneier warns delegates at RSA Conference Europe that judging quality of products can be difficult. A leading security expert has warned businesses to beware of buying shoddy security products. Bruce Schneier, founder and chief technical officer of BT Counterpane, issued the warning at the...

    Source: http://news.zdnet.com/2100-1009_22-6215049.html

  8. New eBay site lets people finance world's poor

    Date: 10/24/07     Keywords: web, ebay

    Web site allows ordinary investors to buy securities aimed at improving conditions in the world's poorest countries. eBay, the world's largest online auctioneer and payments company, launched on Wednesday a Web site allowing ordinary investors to buy securities aimed at improving conditions in the world's poorest countries....

    Source: http://news.zdnet.com/2100-9588_22-6214974.html

  9. Microsoft announces System Center Mobile Device Manager

    Date: 10/23/07     Keywords: microsoft

    Microsoft is really starting to gain serious traction with Windows Mobile in the enterprise arena and their latest announcement made today at CTIA shows how dedicated they really are. Steve Ballmer introduced Microsoft's System Center Mobile Device Manager 2008 server. With this new server system IT professionals will be able...

    Source: http://blogs.zdnet.com/mobile-gadgeteer/?p=659

  10. Symantec, Microsoft cooperate on security

    Date: 10/23/07     Keywords: software, security, virus, antivirus, microsoft

    Despite earlier tussle, the two companies announce joint participation in a forum aimed at promoting security best practices. Antivirus specialist Symantec has joined a security organization alongside Microsoft, despite having previously come to very public blows with the software giant over its willingness to share security information on...

    Source: http://news.zdnet.com/2100-1009_22-6214844.html

  11. Symantec, Microsoft cooperate on security

    Date: 10/23/07     Keywords: software, security, virus, antivirus, microsoft

    At the RSA Conference in Europe, the two companies, which are frequent adversaries, join a security organization and pledge cooperation. Antivirus specialist Symantec has joined a security organization alongside Microsoft, despite having previously come to very public blows with the software giant over its willingness to share security...

    Source: http://news.zdnet.com/2100-1009_22-6214854.html

  12. South Korea lets Microsoft drop antitrust appeal

    Date: 10/17/07     Keywords: microsoft

    Company has already separated its IM from Windows, as ordered by the Korean Fair Trade Commission, and will now pay a $35 million fine. South Korea's antitrust regulator has agreed to allow Microsoft to drop its appeal against the agency's landmark ruling, ending on Wednesday a two-year dispute....

    Source: http://news.zdnet.com/2100-9595_22-6213939.html

  13. Bill would let ID theft victims seek restitution

    Date: 10/17/07     Keywords: no keywords

    Legislation would also give federal prosecutors more tools to combat ID theft and cybercrime, according to Sens. Leahy and Specter. A bipartisan bill that would let victims of identity theft seek restitution for money and time they spent repairing their credit history was introduced on Tuesday in the...

    Source: http://news.zdnet.com/2100-1009_22-6213935.html

  14. Security expert: Storm botnet 'services' could be sold

    Date: 10/16/07     Keywords: no keywords

    Use of encryption key for peer-to-peer traffic, researcher says, could allow creation of smaller networks--and "a lot more of Storm." The owners of the Storm botnet, whose identities are as yet unknown, could be preparing to sell off the "services" of segments of the network, according to Joe...

    Source: http://news.zdnet.com/2100-1009_22-6213781.html

  15. Oracle to push out 51 patches

    Date: 10/15/07     Keywords: software, database

    Update includes fixes for 27 vulnerabilities in Oracle Database, five of which may be exploited remotely without authentication. Oracle plans to push out 51 fixes for flaws in its software, in a self-described "critical patch update" on Tuesday. The flaws affect a number of Oracle products. Some...

    Source: http://news.zdnet.com/2100-1009_22-6213495.html

  16. Survey: Office workers still the greatest security threat

    Date: 10/12/07     Keywords: security

    Sophos study reveals, however, that remote employees are becoming a bigger perceived network threat to businesses. Businesses still consider desktop users to be the biggest security risk to their networks, despite increased concern over outsourced labor and remote users. Sophos today revealed figures from its latest network...

    Source: http://news.zdnet.com/2100-1009_22-6213227.html

  17. Adobe Acrobat, Reader vulnerable to hacks

    Date: 10/10/07     Keywords: software

    Flaw could allow malicious program to infect a PC without a user knowing it; patch might not be available until end of October. Adobe Systems, whose software is used by millions of people to read documents sent over the Internet, said some of its programs contain a flaw...

    Source: http://news.zdnet.com/2100-1009_22-6212767.html

  18. 'Storm worm' exploits YouTube

    Date: 10/10/07     Keywords: security, web, spam

    Spammers may have changed tactics, targeting a familiar Web site rather than PCs for the purpose of spreading the trojan. Spammers are exploiting YouTube's "invite your friends" function to send spam containing a variant of the "Storm worm." Bradley Anstis, director of product management at security firm Marshal,...

    Source: http://news.zdnet.com/2100-1009_22-6212674.html

  19. BlackBerry faces local players, rules in China

    Date: 10/09/07     Keywords: security

    RIM faces daunting challenges, including low-cost homegrown rivals (read: "RedBerry"), security hurdles and regulations. Even before its official launch in China, Research In Motion's BlackBerry faces daunting challenges from low-cost rivals and a thicket of regulations that could trip up its advance into the world's largest mobile market....

    Source: http://news.zdnet.com/2100-1035_22-6212452.html

  20. EU: Intel seeking more time on antitrust reply

    Date: 10/08/07     Keywords: no keywords

    Chipmaker has asked for more time to respond to antitrust charges leveled by the European Commission, an official at the European Union's executive arm said on Monday. U.S. chipmaker Intel has asked for more time to respond to antitrust charges leveled by the European Commission, an official at...

    Source: http://news.zdnet.com/2110-9595_22-6212239.html

Previous page  ||  Next page


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home