1. Wither anti-virus software?

    Date: 03/03/08     Keywords: software, security, virus, web

    In the security industry it's not hard to run into someone predicting the demise of the anti-virus industry. But the end game will take forever to play out. The common argument: Anti-virus software can never keep up, is outdated and outgunned against rapidly evolving threats. Websense CEO...

    Source: http://blogs.zdnet.com/security/?p=913

  2. Exploitation is Still Possible as Third-Parties Neglect to Implement Vista Security Features

    Date: 03/02/08     Keywords: microsoft

    Consider this, Microsoft spends huge amounts of dollars and manpower creating protections for the Vista operating system, yet we still have old school vulnerabilities. Why? The answer is simple really, third-party created code is not stepping up and taking advantage of these powerful protection mechanisms. I'm not...

    Source: http://blogs.zdnet.com/security/?p=912

  3. Airport security concerns: Bluetooth, switchblades and -- wireless X-rays?

    Date: 02/29/08     Keywords: security

    Airport security is obviously a major concern in our country, and I've made some observations that I'd like to share from my recent travels. February and March has turned out to be an insane travelling road show for me. When March completes, I will have spoken...

    Source: http://blogs.zdnet.com/security/?p=911

  4. Air Force: No! Stop! Blogs bad!

    Date: 02/29/08     Keywords: web

    The Air Force has had it with soldiers getting their information from the unsavory world of blogs. The service's Network Operations Center has instituted widespread filtering of the Web, blocking all sites with the letters b-l-o-g in their URLs and filtering out most other sites that qualify as blogs, Wired...

    Source: http://government.zdnet.com/?p=3686

  5. Oil field data loss just common theft

    Date: 02/29/08     Keywords: security

    Sighs of relief can be heard coming from Brazil this week as police arrested four men (port security guards) responsible for heisting some computers that had lots of data from the newly discovered mega-oil-patch off the coast of Brazil. Way back when I was an industry analyst...

    Source: http://blogs.zdnet.com/threatchaos/?p=552

  6. Proposed 3Com buyers aim to allay U.S. security concerns (again)

    Date: 02/29/08     Keywords: security

    Bain Capital and Huawei will resubmit its bid for 3Com to the Committee on Foreign Investment in the U.S. in hopes of closing a deal. A $2.2 billion buyout of 3Com has been hung up over concerns that China's Huawei would have access to critical U.S. security...

    Source: http://blogs.zdnet.com/security/?p=910

  7. Software sales reached $3.3 bln in US in 2007

    Date: 02/29/08     Keywords: software, microsoft

    US retail sales of non-games software totaled $3.3 bln in 2007, a 15% increase over the $2.9 bln generated in 2006. Thanks in large part to new product introductions from companies such as Microsoft, Apple and Adobe, the most significant increases in revenue were seen in operating system, business, finance...

    Source: http://blogs.zdnet.com/ITFacts/?p=14050

  8. Here's my problem with many rogue coders, hackers, Open Source cultists

    Date: 02/28/08     Keywords: no keywords

    I'll call a spade a spade here. Too many hackers, coders, and open source religionists are elitists. They think they know better, and are better, than you and me. But they are not. I've been carrying around this 'tude for a long time,...

    Source: http://blogs.zdnet.com/ip-telephony/?p=3329

  9. U.S.-Mexico 'virtual fence' has huge software holes

    Date: 02/28/08     Keywords: software, security

    Software problems with a 28-mile pilot project send Homeland Security officials back to the drawing board--and cause a three-year delay in plans to seal off the southwestern border of the U.S. WASHINGTON--Technical problems have forced the Bush administration to retool a high-tech "virtual fence" along the U.S.-Mexico border and...

    Source: http://news.zdnet.com/2424-9595_22-189986.html

  10. Is Apple going to ease up on iPhone jailbreakers? Based on what COO said yesterday, kind of sounds like it

    Date: 02/28/08     Keywords: no keywords

    In remarks at an investment conference yesterday, Apple chief operating officer Tim Cook said that because the demand for hacked iPhones exists, there would always be a level of hacking. That type of hacking could be taken to be the type of jailbreaking that when performed...

    Source: http://blogs.zdnet.com/ip-telephony/?p=3327

  11. News to know: EC vs. Microsoft; Google Sites; Evernote's incredible search; iPhone roadmap

    Date: 02/28/08     Keywords: microsoft

    Notable headlines: Larry Dignan: EU slaps Microsoft with $1.35 billion fine Mary Jo Foley: European Commission vs. Microsoft: Who is being unreasonable? Dennis Howlett: Steelie Neelie slaps Microsoft with record fine John Carroll: Microsoft vs. the EC, round 236 ...

    Source: http://blogs.zdnet.com/BTL/?p=8100

  12. Virtual Appliances: Once and done philosophy in action

    Date: 02/28/08     Keywords: technology, asp

    Suppliers offering "virtual appliance servers" have often stopped by to brief me on their products and how they're going to take over the market in some segment or another. The most recent example was a really interesting discussion I had with Dave Asprey, VP of Marketing for Zeus Technology, about...

    Source: http://blogs.zdnet.com/virtualization/?p=352

  13. Secunia: It's not a flaw if it's a feature

    Date: 02/28/08     Keywords: security

    When I reported on the Vocera certificate security bypass flaw, SecurityFocus picked up on it and created Bugtraq ID 27935 to warn their customers about the vulnerability.  I dropped a note to Secunia about the flaw but they seem to believe that a flaw is only a flaw if it...

    Source: http://blogs.zdnet.com/security/?p=909

  14. German court protects personal data privacy

    Date: 02/28/08     Keywords: no keywords

    There is a right to personal computer privacy in Germany, after all, the country's high court said Wednesday. Data stored or exchanged on PCs are protected by the German constitution, the Federal Constitutional Court, AP reports. ''Collecting such data directly encroaches on a citizen's rights, given that...

    Source: http://government.zdnet.com/?p=3678

  15. Only 8,700 insecure ftp servers?

    Date: 02/27/08     Keywords: no keywords

    According to ComputerWorld coverage Finjan is publicizing a source in Hong Kong they have discovered that offers to sell access to hacked ftp servers. The idea is that a malware purveyor or phisher would want ftp access with admin credentials so they can quickly and easily upload there wares to...

    Source: http://blogs.zdnet.com/threatchaos/?p=550

  16. Report: Hackers swipe FTP server credentials using SaaS

    Date: 02/27/08     Keywords: database, security

    Finjan said it has uncovered a database with more than 8,700 FTP account credentials--user name, password and server address--that allow hackers to compromise security and deliver malware as a service. In a report released Wednesday, Finjan said the list of stolen accounts includes many Fortune 500 type...

    Source: http://blogs.zdnet.com/security/?p=908

  17. Steelie Neelie slaps Microsoft with record fine

    Date: 02/27/08     Keywords: microsoft

    When Neelie Kroes burst on the scene as EU Commissioner for Competition with a hefty swipe at Microsoft back in 2004, my thoughts at the time were something like: 'Out of touch, doesn't get the issues.' Four years on and her agenda is unequivocal. Drag Microsoft into line - whatever...

    Source: http://blogs.zdnet.com/Howlett/?p=324

  18. VMware's security strategy: Cut hackers off at the hypervisor

    Date: 02/27/08     Keywords: software, technology, security

    It didn't take long for VMware to answer the security bell. The company on Wednesday announced a technology called VMsafe that aims to integrate security software with the hypervisor--the linchpin of virtualization software. With VMsafe VMware will provide APIs to allow security application vendors to develop products...

    Source: http://blogs.zdnet.com/security/?p=905

  19. McAfee: Trojan targets Windows Mobile

    Date: 02/26/08     Keywords: security

    McAfee has unearthed a Windows Mobile PocketPC Trojan that disables security, installs via a memory card, can't be uninstalled and makes itself your home page. According McAfee's Avert Labs blog, the Trojan has been discovered in China. Here's how it works according to researcher Jimmy Shah: ...

    Source: http://blogs.zdnet.com/security/?p=904

  20. Digg town hall meeting is over - fighting spam answers all questions

    Date: 02/26/08     Keywords: no keywords

    As promised, Digg held its first "town hall" meeting yesterday (via UStream), and although it was fun to see founders Jay Adelson and Kevin Rose answer questions in front of a camera -- laptops in hand, Diggnation style -- we didn't really learn much new. Almost all...

    Source: http://blogs.zdnet.com/social/?p=409

Previous page  ||  Next page


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home