1. You can keep on asking...

    Date: 02/26/08     Keywords: security

    But you have to ask the right questions.  Two senators have sent a letter to 24 US agencies asking them to report on their progress in data protection. This article at Federal Computer Week highlights the woeful state of security compliance at most US agencies. This is...

    Source: http://blogs.zdnet.com/threatchaos/?p=549

  2. The firewall is a little restrictive, don't you think?

    Date: 02/26/08     Keywords: no keywords

    We recently installed a new firewall that will ultimately allow the high school to act as a hub for all district network traffic. Since we're the only building with the space, HVAC, and bandwidth to act as a de facto data center, this makes good sense and will allow...

    Source: http://education.zdnet.com/?p=1543

  3. Chatback: Let people comment using Google Talk

    Date: 02/26/08     Keywords: web, google

    Most blogs let you leave comments, but often it's a hassle because you have to log in and/or create an account. This is one of the reasons Google launched "chatback" -- a badge that users can put on any webpage that gives readers a direct link to speak with...

    Source: http://blogs.zdnet.com/Google/?p=941

  4. Beyond compliance: Keys to effective user access risk management

    Date: 02/25/08     Keywords: security

    The demands of regulatory compliance are among the factors driving corporate IT and security managers to improve their access governance processes, but that's not the whole story, says Aveska CEO Deepak Taneja. Commentary--The stakes involved in access-related risk have risen dramatically...

    Source: http://news.zdnet.com/2424-9595_22-189544.html

  5. The EU: Too much control over the tech sector (and Microsoft) ?

    Date: 02/25/08     Keywords: technology, asp, microsoft

    You can't understand the technology deals without being fluent in EU regulator-speak. And you also can't grasp Microsoft's next move without pondering what the European Union will do. Luckily, the Wall Street Journal shed a little light on the EU's antitrust chief Neelie Kroes. Kroes is the one...

    Source: http://blogs.zdnet.com/BTL/?p=8082

  6. Tempering the EC's antitrust enthusiasm

    Date: 02/25/08     Keywords: microsoft

    In response to Microsoft's interoperability announcements last week, the EC, a force that has been pushing Microsoft down the "open" road for quite some time, had the following to say in response: The European Commission takes note of today's announcement by Microsoft of its intention to commit to...

    Source: http://blogs.zdnet.com/carroll/?p=1805

  7. Researcher: Critical vulnerability found in VMware's desktop apps

    Date: 02/25/08     Keywords: software, security

    Core Security Technologies said Monday that it has discovered vulnerability in VMware's desktop virtualization software that allows an attacker to gain complete control a system and launch executable files on the host operating system. The discovery is notable given that virtualization security is largely uncharted territory. However,...

    Source: http://blogs.zdnet.com/security/?p=902

  8. YouTube shut down reveals some serious net security weaknesses

    Date: 02/25/08     Keywords: google

    It isn't often that the world of political repression interferes with our ability to watch home videos of cat tricks, but in a bizarre turn of events that's what happened over the weekend. Google-owned YouTube is a favorite target not only of copyright holders, who complain the...

    Source: http://government.zdnet.com/?p=3669

  9. "They" could be listening to your VoIP calls: here's what to do about it

    Date: 02/25/08     Keywords: no keywords

    Paul Ogle at VoIP-News alerts me to a newly posted article on their site. The article is entitled,  Is Someone Listening To Your VoIP Calls? Premise: Calls transmitted via a LAN, a WAN or the Internet can be easily intercepted by anyone with a protocol...

    Source: http://blogs.zdnet.com/ip-telephony/?p=3294

  10. Microsoft buying SAP isn't a picnic either

    Date: 02/24/08     Keywords: yahoo, microsoft

    Microsoft should acquire SAP instead of fooling around with Yahoo, according to Michael A. Cusumano, management professor at MIT. Does that deal make sense? Yes, but there are serious complications. In a New York Times article, Cusumano questions the idea of Microsoft acquiring Yahoo for good reason--the opportunity costs...

    Source: http://blogs.zdnet.com/BTL/?p=8072

  11. Pakistan takes out YouTube

    Date: 02/24/08     Keywords: no keywords

    Like I said in a recent post, the Internet is a series of tubes. Sometimes that helps route around malicious legislation and regulators, somethings it causes big problems.   Like today at 2 PM eastern when someone in Pakistan announced a more specific BGP route announcement for the block of IP...

    Source: http://blogs.zdnet.com/threatchaos/?p=546

  12. Top malware countries: Russia, China, US, Brazil, UK

    Date: 02/24/08     Keywords: no keywords

    Russia now occupies number one spot on Sophos malware ranking list with 27.4% of malware, slightly ahead of China on 27%. Both leave the US trailing in third with 10.1%, Brazil on 6.6%, and the UK with 5.32%. by AM

    Source: http://blogs.zdnet.com/ITFacts/?p=13995

  13. Cisco confirms vulnerability in 7921 Wi-Fi IP phone

    Date: 02/23/08     Keywords: security

    Two days after news of the Vocera Wi-Fi VoIP communicator PEAP security bypass vulnerability, I received confirmation from Cisco that their model 7921 Wi-Fi VoIP phone is also vulnerable to the same issue where digital certificates aren't cryptographically verified.  Both Cisco and Vocera have told me that they intend to...

    Source: http://blogs.zdnet.com/security/?p=901

  14. What format war? Just convert your HD DVDs to Blu-ray

    Date: 02/21/08     Keywords: no keywords

    Our friends over at Wired have started a how-to wiki, explaining how to convert one's HD DVDs to Blu-ray - provided you have a Blu-ray burner on hand, and don't mind breaking a law or two (since you'll need to remove the DRM from your HD DVDs before you can...

    Source: http://blogs.zdnet.com/gadgetreviews/?p=145

  15. Should we even bother asking teachers?

    Date: 02/21/08     Keywords: no keywords

    I posted the first part of my evaluation of an Apple MacBook for an educational deployment Wednesday morning (MacBooks - to deploy or not to deploy, part 1). While of course sparking the usual Mac vs. PC talk, one reader made an interesting point: Are teachers asked what...

    Source: http://education.zdnet.com/?p=1536

  16. Design flaw in wireless VoIP handsets endanger the enterprise

    Date: 02/21/08     Keywords: security

    Security conscious businesses and organizations who implemented 802.1x/EAP enterprise-grade authentication are at risk with certain implementations of wireless LAN VoIP handsets.  I have verified that Vocera Communications is one of the vulnerable vendors and I have heard from other security researchers that Cisco's wireless VoIP handsets have this design flaw...

    Source: http://blogs.zdnet.com/security/?p=896

  17. Black Hat, Day 1: Cracking GSM and skimming ATMs

    Date: 02/21/08     Keywords: no keywords

    Day 1 at Black Hat brought some outstanding talks. The day started off with David Hulton (aka h1kari, also the producer of ToorCon) and Steve (from THC), who presented on "Cracking GSM". It was quite interesting due to the tie-in that David has with Pico...

    Source: http://blogs.zdnet.com/security/?p=895

  18. Identity theft down 12% in 2007

    Date: 02/21/08     Keywords: no keywords

    Overall identity fraud is declining in the United States: down by an estimated 12% over 2006, which represents a total fraud reduction of $6 bln. Fraudsters are turning to lower-tech methods by utilizing telephone theft more than ever before, Javelin Research says. Access through mail and telephone transactions grew...

    Source: http://blogs.zdnet.com/ITFacts/?p=13964

  19. MySpace exploring ad-supported music venture

    Date: 02/20/08     Keywords: no keywords

    Watch out Last.FM, Imeem, We7 and SpiralFrog, MySpace could be about to enter the ad-supported music game. According to an earlier report by paidContent and echoed in yesterday's Financial Times, MySpace - or rather its parent company News Corp. - has been exploring forming a joint music...

    Source: http://blogs.zdnet.com/social/?p=407

  20. 3Com, Bain, Huawei pull filing with U.S. foreign investment committee

    Date: 02/20/08     Keywords: no keywords

    The proposed 3Com takeover has hit another snag with the Committee on Foreign Investment in the United States (CFIUS). In a statement Wednesday, 3Com said Bain Capital Partners and Huawei Technologies have withdrawn their filing with the CFIUS regarding their proposed merger. As background, the proposed takeover...

    Source: http://blogs.zdnet.com/security/?p=893

Previous page  ||  Next page


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home