1. DHS security flap swirls around Unisys

    Date: 09/24/07     Keywords: security, web

    Unisys is under fire over data breaches at the Department of Homeland Security. Unisys maintains that it did nothing wrong. On Monday, the Washington Post reported that the FBI is investigating Unisys after it allegedly failed to detect data breaches linked to a Chinese-language Web site. To make...

    Source: http://blogs.zdnet.com/BTL/?p=6360

  2. Today's Debate: Can we end fear of privacy breaches?

    Date: 09/24/07     Keywords: microsoft, google

    Today's Financial Times has a long feature about search engines and privacy, which notes (among other things) that even Microsoft is now lobbying for a new law mandating privacy standards. (Google wants them to apply worldwide.) What's most interesting to me, though, is a chart, created from...

    Source: http://healthcare.zdnet.com/?p=289

  3. Storm Worm botnet numbers, via Microsoft

    Date: 09/24/07     Keywords: software, microsoft

    If the statistics from Microsoft's MSRT (malicious software removal tool) are anything to go by, the Storm Worm botnet is not quite the world's most powerful supercomputer. The tool -- which is updated and shipped once a month on Patch Tuesday -- removed malware associated with Storm...

    Source: http://blogs.zdnet.com/security/?p=533

  4. ZoneAlarm ForceField puts browser in a sandbox

    Date: 09/24/07     Keywords: software, browser, security, spyware

    Check Point Software Technologies has released a public beta of ZoneAlarm ForceField, a browser virtualization security tool that promises anti-phishing and spyware-blocking capabilities. The software is available as a free download during the beta testing period. Check Point plans to slap a $29.95 price tag on...

    Source: http://blogs.zdnet.com/security/?p=535

  5. Know Phish, Go Phish?

    Date: 09/24/07     Keywords: spam

    I get phishing scams in my email all the time. Some even defeat spam filters. Over at our sister site Tech Republic, blogger Jason Fielding muses on why some people still fall for this stuff. He writes that curiousity got...

    Source: http://blogs.zdnet.com/ip-telephony/?p=2411

  6. Unisys probed for Homeland Security breach

    Date: 09/24/07     Keywords: security, web

    FBI is checking allegations Unisys failed to detect cyber break-ins at Homeland Security Department and tried to cover up its shortcomings. The FBI is investigating allegations that Unisys failed to detect a Chinese Web site's cyber break-ins on computers at the U.S. Department of Homeland Security and then...

    Source: http://news.zdnet.com/2100-1009_22-6209631.html

  7. MiSpy - capture your own clickstream and sell it or don't

    Date: 09/23/07     Keywords: no keywords

    The rise of Facebook has reopened a can of worms - who owns an individuals personal data and their social networks? Obviously, individuals want control over the data generated by their online activities, who their friends and colleagues are, and what they like or don't. ...

    Source: http://blogs.zdnet.com/Foremski/?p=195

  8. China says it's a cyber-attack victim, not villain

    Date: 09/22/07     Keywords: no keywords

    China has been the target of a big increase in cyber-attacks in recent years, a military researcher says. China has been the target of a big increase in cyber-attacks in recent years and faces more of a threat from hackers than any country in the West, a...

    Source: http://news.zdnet.com/2100-1009_22-6209570.html

  9. One last tilt at the antitrust windmill

    Date: 09/21/07     Keywords: microsoft

    I've been obsessing on antitrust this week, which should come as no surprise as a lot of people much more important than me have been stuck on the subject since the Court of First Instance passed down its Microsoft decision Monday. One thing that bothers me about the decision, however,...

    Source: http://blogs.zdnet.com/carroll/?p=1752

  10. Microsoft hacker summit tackles security veil of virtualization

    Date: 09/21/07     Keywords: software, security, microsoft

    The Fall edition of Microsoft's Blue Hat hacker summit will kick off next week with a heavy focus on piercing the security veil of virtualization and process isolation. At Blue Hat v6, scheduled for September 27-28 in Redmond, external security researchers and internal Microsoft software engineers...

    Source: http://blogs.zdnet.com/security/?p=532

  11. Symantec warns users over Bluetooth security

    Date: 09/21/07     Keywords: technology, security

    Executive offers advice on how to combat growing security threats linked to use of Bluetooth-equipped devices. With Bluetooth wireless features fast becoming commonplace on mobile devices, users need to be aware of the security vulnerabilities linked to the technology, said a Symantec executive. A study by research...

    Source: http://news.zdnet.com/2100-1009_22-6209361.html

  12. Australia pushes further Web censorship

    Date: 09/21/07     Keywords: web

    Touted as tool for targeting phishing and terrorist sites, new bill would allow police to alter current Internet "blacklist." A bill introduced this week by Australia's Parliament would give the Australian federal police the power to control which sites can and cannot be viewed by Australian Web surfers....

    Source: http://news.zdnet.com/2100-9588_22-6209337.html

  13. Why restraining Microsoft no longer matters

    Date: 09/21/07     Keywords: microsoft

    European regulators won a big court victory this week but CNET News.com's Charles Cooper says Microsoft must fend off a bigger challenge. Historians famously scorn generals who prepare to fight the previous wars. But what would they say about regulators still struggling to set proper rules of engagement...

    Source: http://news.zdnet.com/2010-9595_22-6209284.html

  14. Analyst: Virtualization set to boost mobile security

    Date: 09/21/07     Keywords: technology, security

    Technology to help tackle problem of data loss from corporate mobile devices, but the tools won't exist until 2012, Gartner says. LONDON--Virtualization will be a key technology to help companies beef up security on corporate mobile devices, Gartner says. The technology is predicted to be used to...

    Source: http://news.zdnet.com/2100-1009_22-6209332.html

  15. News to know: Vista DRM; Flash drives; Adobe zero-day; Blacklisted iPhones

    Date: 09/21/07     Keywords: no keywords

    Notable headline: Ed Bott: Everything you've read about Vista DRM is wrong (Part 3). Robin Harris: Will flash EVER replace disk? Ryan Naraine: 'High risk' zero-day flaw haunts Adobe Acrobat, Reader. Jason O'Grady: Apple blacklisting hacked iPhones? ...

    Source: http://blogs.zdnet.com/BTL/?p=6337

  16. Skype troubleshooting tips: just one of many 'Net telephony eHows

    Date: 09/21/07     Keywords: web

    In the first Internet boom, the website eHow was an online community of experts who posted some 15,000 step-by-step how-to articles before eHow crashed and burned back around 2001. For four years, that archive was preserved on the Web as a frozen moment in time, a...

    Source: http://blogs.zdnet.com/ip-telephony/?p=2391

  17. 'High risk' zero-day flaw haunts Adobe Acrobat, Reader

    Date: 09/20/07     Keywords: software

    Adobe's ever-present Acrobat/PDF Reader software is prone to a nasty code execution vulnerability that could expose Windows users to PC takeover attacks. Details of the flaw, which affects Windows XP SP2 with IE7 and Adobe Reader 8.1, 8.0 and 7 are being kept under wraps until Adobe...

    Source: http://blogs.zdnet.com/security/?p=530

  18. China leads Asia in malicious online activity

    Date: 09/20/07     Keywords: spam

    Report finds that China topped the region in the first half of 2007, producing the most malicious code, spam zombies, bots and attacks. China leads Asia in malicious online activity, racking up 42 percent of the action in the first half of 2007, up from 39 percent last...

    Source: http://news.zdnet.com/2100-1009_22-6209172.html

  19. VMware patch batch fixes 20 security flaws

    Date: 09/20/07     Keywords: software, security

    Virtualization software specialist VMware has shipped a batch of "critical" security updates to cover gaping holes in a wide range of its server and workstation products. An advisory from VMware lists a total of 20 different vulnerabilities affecting all supported versions of VMware ESX Server, VMware Server,...

    Source: http://blogs.zdnet.com/security/?p=526

  20. Cyber crime is *not* bigger than illegal drug trade

    Date: 09/20/07     Keywords: no keywords

    How many times is this meme going to circle the globe? It is as bad as the modem tax or the business card boy. Now the newly annointed CEO of McAfee has picked up on the idea that cyber crime exceeds the world wide drug trade. This is just...

    Source: http://blogs.zdnet.com/threatchaos/?p=480

Previous page  ||  Next page


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home