1. Someone get me rewrite: Apple delivers monster security update for OS X

    Date: 03/18/08     Keywords: security

    Apple delivered a security update for Tiger and Leopard Tuesday with at least 80 patches addressing multiple vulnerabilities. You know it's a big patch haul from Apple when you read the advisory and: You're not sure where to begin; You're IMing fellow security...

    Source: http://blogs.zdnet.com/security/?p=963

  2. How to detect network vulnerabilities?

    Date: 03/18/08     Keywords: software

    Computer scientists at George Mason University (GMU) have developed a new software to identify complex cyber network attacks. This software is named CAULDRON (short for 'Combinatorial Analysis Utilizing Logical Dependencies Residing on Networks'). The developers claim that CAULDRON 'can reduce the impact of cyber attacks by identifying the possible vulnerability...

    Source: http://blogs.zdnet.com/emergingtech/?p=867

  3. News to know: Apple; Hakia; EclipseCon; ActiveX security

    Date: 03/18/08     Keywords: technology, java, microsoft

    Notable headlines: David Morgenstern: Did Microsoft beat Apple to dual-sided touch technology? Jason O'Grady: Apple bumps Airport Express to 802.11n Paul Miller: hakia licenses OntoSem technology to third parties Paula Rooney: Run-time rival for Java, .NET? Dana Gardner: EclipseCon debuts...

    Source: http://blogs.zdnet.com/BTL/?p=8244

  4. ActiveX woes bite CA BrightStor

    Date: 03/18/08     Keywords: no keywords

    Another day another ActiveX problem. This time an ActiveX vulnerability in CA BrightStor ARCServe Backup could be exploited to compromise a user's system. A Secunia alert rates the vulnerability "highly critical." Here are the details: Krystian Kloskowski has reported a vulnerability in CA BrightStor ARCserve Backup,...

    Source: http://blogs.zdnet.com/security/?p=960

  5. Trend Micro falls victim to Web hack

    Date: 03/14/08     Keywords: security, web

    It's not much fun when one of your security vendors falls to a Web attack. Infoworld reports that TrendMicro was a victim of a recent Web attack that used legit sites to deliver malware. According to InfoWorld Trend Micro removed the infected pages from its Web site....

    Source: http://blogs.zdnet.com/security/?p=953

  6. How dangerous is the pacemaker hack?

    Date: 03/14/08     Keywords: no keywords

    Not very. Despite the snarky headlines, you're not going to be able to create a zombie army with this hack. As our own Chris Soghoian notes, many newer pacemakers give off signals which can be read up to 5 meters away. That's a Bluetooth distance,...

    Source: http://healthcare.zdnet.com/?p=801

  7. Got room in your heart for a hacker?

    Date: 03/13/08     Keywords: security

    I was looking over famed security researcher and cryptography expert Bruce Schneier's blog today and found an article on hacking medical devices.  I have to admit that I was surprised, but I shouldn't have been.  These days, if you can build it, we can break it seems to be the...

    Source: http://blogs.zdnet.com/security/?p=948

  8. Adobe plugs vulnerabilities for Form Designer, ColdFusion, Reader

    Date: 03/13/08     Keywords: security

    Adobe this week issued security bulletins and patches for products ranging from ColdFusion to Form Designer. In Adobe's security bulletin the company outlined the following in order of importance: CVE--2007-6253:  Adobe says "critical vulnerabilities have been identified in Form Designer 5.0 and Form Client...

    Source: http://blogs.zdnet.com/security/?p=947

  9. Personal information of Harvard grad students compromised

    Date: 03/13/08     Keywords: security

    Harvard's graduate school of arts and sciences said that roughly 10,000 individuals may have had their personal information compromised by a security breach. The intrusion was discovered in February, according to a Harvard statement released Wednesday. Of the 10,000 affected, 6,600 got a year's worth of free...

    Source: http://blogs.zdnet.com/security/?p=945

  10. IE 8: Threats will evolve to elude Microsoft's new security features

    Date: 03/13/08     Keywords: security, microsoft

    As most of the tech world knows, IE 8 has landed with its first beta, but the security improvements may raise some other issues to ponder. Folks--especially security researchers--are kicking the tires on IE 8 (all resources) and finding a few problems that go along with Microsoft's...

    Source: http://blogs.zdnet.com/security/?p=944

  11. Govtech newsfeed

    Date: 03/13/08     Keywords: microsoft

    A few links to govtech stories of interest: Microsoft Submits Windows 7 for Antitrust Review (Slashdot) Gates seeks more high-tech visas (AP) FreedomSpeaks lets citizens easily write to Congress by Richard Koman

    Source: http://government.zdnet.com/?p=3708

  12. Skepticism and Mary Jo Foley

    Date: 03/12/08     Keywords: microsoft

    Mary Jo Foley recently wrote a piece explaining why her Microsoft skepticism is warranted given the "suspicious coincidence" that these moves toward "transparency, standards and interoperability" fell so close to important signposts in Microsoft's tangled road through the legal and regulatory minefield. The much ballyooed interoperability announcement took place close to...

    Source: http://blogs.zdnet.com/carroll/?p=1811

  13. Have a heart (attack): Defibrillators, pacemakers vulnerable to hackers

    Date: 03/12/08     Keywords: no keywords

    Researchers have discovered that an implantable heart device, a combination of a defibrillator and pacemaker, is vulnerable to hackers. According to a study, authored by researchers at the University of Washington, University of Massachusetts Amherst and Harvard Medical School, hackers could get wireless access to a heart...

    Source: http://blogs.zdnet.com/BTL/?p=8218

  14. Microsoft updates Mac Office 2008, 2004

    Date: 03/12/08     Keywords: security, microsoft

    Redmond pushes security fixes for users of the older Microsoft Office 2004 for Mac, while owners of the recently released Office 2008 receive a large dose of stability fixes (more like instability fixes) and security patches. Microsoft's Mac Business Unit informed us via the corporate...

    Source: http://blogs.zdnet.com/Apple/?p=1400

  15. New camera detects objects under clothes

    Date: 03/11/08     Keywords: technology

    Everyone's excited about the new British camera that can image objects hidden under clothes. The T5000 camera, created by ThruVision, uses "passive imaging technology" to identify objects by the natural electromagnetic rays they emit, Reuters says. It can detect images up to 80 feet away, even when people...

    Source: http://government.zdnet.com/?p=3701

  16. Cyber-Storm II is blowing through DC

    Date: 03/11/08     Keywords: technology, security

    It's time, once again, for Cyber Storm, the "the largest-ever exercise designed to evaluate the mettle of information technology experts and incident response teams" from 18 federal agencies and nine states, The Washington Post. Jerry Dixon, a former director of the National Cyber Security Division...

    Source: http://government.zdnet.com/?p=3697

  17. Symantec announces Norton Mac-Windows antivirus bundle

    Date: 03/11/08     Keywords: security, virus, antivirus

    When Mac owners move into Windows virtualization, they should be responsible and that means running PC security. Making this task a one-click purchase, Symantec this week released a Norton AntiVirus package covering both Mac and Windows platforms. The $69.95 package includes Norton AntiVirus 11 for Mac and...

    Source: http://blogs.zdnet.com/Apple/?p=1399

  18. RealPlayer: More ActiveX security headaches

    Date: 03/11/08     Keywords: no keywords

    RealPlayer has a another ActiveX vulnerability that leaves Windows users on IE at risk. Elazar Broad, who frequently flags ActiveX problems, issued an alert Sunday on message board lists. Broad is currently working on an exploit for it. Here's the message: Hash: SHA1...

    Source: http://blogs.zdnet.com/security/?p=942

  19. PCI security standard endangers wireless LANs

    Date: 03/11/08     Keywords: security

    With wireless penetration tools like KARMA and the new FreeRADIUS-WPE, users who are using urban legend security and enterprise wireless LANs are more vulnerable than ever. One of the biggest threats facing wireless LAN users is SSID probing which is forced by the reckless usage of SSID broadcast suppression....

    Source: http://blogs.zdnet.com/security/?p=941

  20. Why flu virus prefers to strike in winter

    Date: 03/10/08     Keywords: virus

    You probably have been affected by flu several times in your life, and it has certainly happened in cold winter months, at least if you don't live in tropical countries. Why is the flu virus more infectious when it's cold? A U.S. National Institutes of Health (NIH) has an explanation....

    Source: http://blogs.zdnet.com/emergingtech/?p=859

Previous page  ||  Next page


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home