1. IBM bakes security into processors

    Date: 04/10/06     Keywords: technology, security

    "Secure Blue" adds encryption technology to processors, promising better security for data on PCs and portable devices.

    Source: http://news.zdnet.com/2100-1009_22-6059276.html

  2. Sample virus targets Windows and Linux

    Date: 04/08/06     Keywords: software, linux

    Another example of malicious software that can infect computers running Windows or Linux has been discovered.

    Source: http://news.zdnet.com/2100-1009_22-6059140.html

  3. Sun layoffs hit high-end server group

    Date: 04/07/06     Keywords: no keywords

    Company cuts 7 percent of Sparc server group employees in latest effort to reduce expenses.

    Source: http://news.zdnet.com/2100-1009_22-6058894.html

  4. Another security hole found in IE

    Date: 04/06/06     Keywords: no keywords

    Flaw could aid phishing scammers seeking to pilfer personal information from unsuspecting Net users.

    Source: http://news.zdnet.com/2100-1009_22-6058557.html

  5. Microsoft to slap patch on risky IE hole

    Date: 04/06/06     Keywords: browser, security

    Next week will see five security updates for Windows and Office, including a fix for a browser flaw being used in cyberattacks.

    Source: http://news.zdnet.com/2100-1009_22-6058548.html

  6. HP warns of printer software risks

    Date: 04/06/06     Keywords: software, security

    Security hole in software for Color LaserJet printers could open a door for cybersnoops.

    Source: http://news.zdnet.com/2100-1009_22-6058284.html

  7. McAfee buys search-warning company

    Date: 04/05/06     Keywords: security

    Security giant acquires SiteAdvisor, which helps fortify defenses for people before they browse potentially malicious sites.

    Source: http://news.zdnet.com/2100-1009_22-6057923.html

  8. Developers fast to fix open-source bugs

    Date: 04/04/06     Keywords: no keywords

    Holes in popular open-source packages found in a government-funded scan were plugged swiftly, Coverity says.

    Source: http://news.zdnet.com/2100-1009_22-6057669.html

  9. Cybercrooks ramp up against antivirus firms--and each other

    Date: 04/04/06     Keywords: asp

    Net criminals are fighting the good guys--and other bad guys--as they pursue more financial gain, Kaspersky Labs says.

    Source: http://news.zdnet.com/2100-1009_22-6057654.html

  10. Spitzer puts another firm in spyware crosshairs

    Date: 04/04/06     Keywords: spyware

    New York's attorney general alleges that Direct Revenue secretly installed millions of spyware programs that popped up ads.

    Source: http://news.zdnet.com/2100-1009_22-6057543.html

  11. Payment processor fears credit card crooks

    Date: 04/04/06     Keywords: no keywords

    Authorize.Net says its service was used in an attempt to charge money to stolen credit and debit cards.

    Source: http://news.zdnet.com/2100-1009_22-6057305.html

  12. The secret of phishers' success

    Date: 04/03/06     Keywords: no keywords

    Scams are sophisticated enough to trap many consumers despite widespread public warnings, a study finds.

    Source: http://news.zdnet.com/2100-1009_22-6057000.html

  13. McAfee repackages security products

    Date: 04/02/06     Keywords: software, security

    New "Total Protection" products for businesses aim to simplify purchase, installation, management and running of security software.

    Source: http://news.zdnet.com/2100-1009_22-6056805.html

  14. Phishers set hidden traps on eBay

    Date: 04/01/06     Keywords: ebay

    Click on a specially crafted listing, and you could get a nasty surprise. But eBay is on the case.

    Source: http://news.zdnet.com/2100-1009_22-6056687.html

  15. Seeking changes to the DMCA

    Date: 04/01/06     Keywords: security

    Controversial law hinders warnings to consumers on matters like Sony rootkits, security researchers say.

    Source: http://news.zdnet.com/2100-1009_22-6056616.html

  16. Yahoo: We need effective cybercrime laws

    Date: 03/31/06     Keywords: technology, yahoo

    Policymakers need to define illegal use of technology rather than focus on how an action breaks the law, Yahoo exec says.

    Source: http://news.zdnet.com/2100-1009_22-6056523.html

  17. Fighting fraud by baiting phishers

    Date: 03/31/06     Keywords: security

    RSA Security's newly acquired Cyota overwhelms phishing sites with fake usernames, passwords and credit card info.

    Source: http://news.zdnet.com/2100-1009_22-6056317.html

  18. BBC stories used as bait for IE exploit

    Date: 03/31/06     Keywords: no keywords

    Attackers are sending e-mail messages with news stories to trick people into visiting sites that exploit a recent IE flaw.

    Source: http://news.zdnet.com/2100-1009_22-6056217.html

  19. Microsoft extends life of security scanner

    Date: 03/31/06     Keywords: security

    Last-minute extension prevents a gap in security update detection for users of the MBSA vulnerability assessment tool.

    Source: http://news.zdnet.com/2100-1009_22-6056142.html

  20. ID cards to be mandatory in U.K. by 2010

    Date: 03/30/06     Keywords: no keywords

    U.K. lawmakers reach compromise on bill, extend controversial requirement for those renewing passports by two years.

    Source: http://news.zdnet.com/2100-1009_22-6055964.html

Previous page  ||  Next page


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home