-
Android at WMC from a developer's perspective
Date: 02/12/08
Keywords: no keywords
Android is building momentum at the Mobile World Congress '08 in Barcelona this week. Companies like Texas Instruments have been showing off prototypes running the Android operating system -- and by the sounds of it, people can't get enough. Engadget has some early pictures of what attendees are...
Source: http://blogs.zdnet.com/Google/?p=922
-
Father of anti-virus says to invest in security awareness training
Date: 02/11/08
Keywords: virus
I don't want to start a debate here over who invented anti-virus. According to DarkReading it is Peter Tippett.(see the recent debate over who invented the firewall here. Is Dark Reading going to also knight the inventor of malware if they can track him down?) In...
Source: http://blogs.zdnet.com/threatchaos/?p=532
-
The one big POTENTIAL flaw that could REALLY mess up Google Android
Date: 02/11/08
Keywords: google
Given that I am not in Barcelona at the Mobile World Congress (nev kinda like the music I am not in a physical space where I can view all the Google Android. But I am in a space where I can monitor what's going on, and offer...
Source: http://blogs.zdnet.com/ip-telephony/?p=3202
-
What's Microsoft's Plan B?
Date: 02/09/08
Keywords: blogging, yahoo, microsoft
My ZDNet blogging colleague Larry Dignan asks what Yahoo's Plan B will be, now that it reportedly is turning down Microsoft's $44 acquisition billion bid because it is too low. But I'm wondering about the flip-side of this equation: What is Microsoft's Plan B if it fails to snag Yahoo?...
Source: http://blogs.zdnet.com/microsoft/?p=1170
-
5.49 mln unique samples of malicious software in 2007
Date: 02/09/08
Keywords: software
AV Test reported that it saw 5.49 mln unique samples of malicious software in 2007, 5x more than the 972,606 it saw in 2006. by AM
Source: http://blogs.zdnet.com/ITFacts/?p=13886
-
DRM - in a nutshell
Date: 02/08/08
Keywords: security
For years now I've been trying to define DRM and how commercial companies use it to lock consumers into a buying cycle. Finally I've found a definition that's just perfect. The definition comes from security guru Bruce Schneier: In my last column, I talked about the...
Source: http://blogs.zdnet.com/hardware/?p=1246
-
The diabetes trial failure
Date: 02/08/08
Keywords: web
The "failure" of a major diabetes study has reporters and their sources wringing their hands. This should not be. (The picture is from the WebMD's doctors' site, medicinenet.) Science often makes wrong turns, especially when it's applied in the form of engineering or products....
Source: http://healthcare.zdnet.com/?p=699
-
Mozilla delivers hefty patch haul for Firefox
Date: 02/08/08
Keywords: security, web
Mozilla on Friday delivered its Firefox 2.0.0.12 update including patches that fix a Web forgery flaw, browsing history and forward navigation stealing and the directory traversal via chrome, which has been the most visible vulnerability of late. According to the Firefox security advisory, Mozilla filed the following...
Source: http://blogs.zdnet.com/security/?p=870
-
RBAC problems wipe out AT&T DSL in California
Date: 02/08/08
Keywords: no keywords
If things weren't bad enough last night with the computer problems I had, things got worse when AT&T decided to do an unannounced maintenance. This was sort of similar to the massive network outage last year where the network goes down but they don't even bother to tell their own...
Source: http://blogs.zdnet.com/Ou/?p=995
-
Microsoft previews 12 security bulletins, 7 'critical'; Excel fix likely en route
Date: 02/07/08
Keywords: security, microsoft
Microsoft on Thursday issued advance notice of 12 security bulletins ahead of its February batch of patches with seven critical flaws affecting Vista, Internet Explorer and Office. The most notable patch will likely cover that Excel zero day vulnerability that surfaced last month. Since Microsoft confirmed the...
Source: http://blogs.zdnet.com/security/?p=866
-
Funny. 5/3 Bank advertises malware site in brochure
Date: 02/07/08
Keywords: no keywords
An alert blogger at BuggStompers picked up a brochure at his last visit to the bank. The brochure, titled "Protect Yourself From Malware" points you to a site to download Spybot search and destroy. But it is not Patrick Kolla's site at Safe Networking that they provide....
Source: http://blogs.zdnet.com/threatchaos/?p=530
-
Google, IBM, Microsoft and VeriSign join Yahoo on OpenID
Date: 02/07/08
Keywords: yahoo, microsoft, google
The OpenID Foundation on Thursday said that Google, IBM, Microsoft, VeriSign and Yahoo have joined its board. The additions--Yahoo joined OpenID last month and made its accounts compatible--are a big boost to the single sign-on initiative. While these newcomers are a nice addition to the board it's...
Source: http://blogs.zdnet.com/BTL/?p=7918
-
Is Jazz a trojan horse for IBM Rational tools?
Date: 02/07/08
Keywords: software
CollabNet CTO Jack Repenning called in yesterday, all a-dither about Jazz being a "trojan horse" on behalf of IBM's Rational software tools. Jazz is merely a checkpoint to indicate distributed software development tools are still coming, he said. "I used Rational as a user for years, and...
Source: http://blogs.zdnet.com/open-source/?p=1986
-
Four cable 'cuts' in a week: Conspiracy nuts light up the phones
Date: 02/06/08
Keywords: no keywords
So what's going on with telecom cable interruptions in the Middle East? First a ship's anchor cut into two high-priority cables -- Flag Telecom's Europe-Asia cable and the consortium-owned SEA-ME-WE 4 system. That pretty seriously damaged communications in the Middle East and choked - but didn't cut off - traffic...
Source: http://government.zdnet.com/?p=3644
-
Apple drops QuickTime patch
Date: 02/06/08
Keywords: web
Apple on Wednesday dropped a patch for QuickTime to fix a arbitrary code execution vulnerability. Relative to other recent QuickTime patches this one was small--only one vulnerability that could lead to an "unexpected application termination or arbitrary code execution" if a user visits a malicious Web site....
Source: http://blogs.zdnet.com/security/?p=860
-
WordPress 2.3.3. an 'urgent security release'
Date: 02/06/08
Keywords: security
WordPress has released version 2.3.3 to plug a flaw that would allow a specially crafted request to edit posts of other users on that blog. In a post, WordPress noted that 2.3.3 is "an urgent security release." You can fix the flaw without downloading the new version....
Source: http://blogs.zdnet.com/security/?p=859
-
Adobe delivers Reader patch (very quietly)
Date: 02/06/08
Keywords: security
If you got a prompt to upgrade your Adobe Reader to version 8.1.2 you're not alone. Betcha didn't know it's a major security fix though. Why? You wouldn't know because Adobe hasn't told anyone. The best information you'll get is a few snippets in an Adobe Knowledge...
Source: http://blogs.zdnet.com/security/?p=858
-
Europe still top source of spam
Date: 02/06/08
Keywords: security, spam
For the third month running, compromised computers in Europe have pushed out more spam than those in the U.S. European spam networks have pumped out more unsolicited e-mail than those in the U.S. for the third month in a row, according to security vendor Symantec. Symantec...
Source: http://news.zdnet.com/2100-1009_22-6229352.html
-
Does a compelling product make you overlook the built-in DRM?
Date: 02/06/08
Keywords: no keywords
Let's say there was a compelling product on sale that interested you. Maybe it's a games console, or maybe it's a player of some kind. Or it could even be a service such as iTunes or Audible. Let's say that you really wanted what this product or service had to...
Source: http://blogs.zdnet.com/hardware/?p=1229
-
A dozen free & essential apps for Windows
Date: 02/06/08
Keywords: no keywords
Every time I build a new Windows computer, there are a dozen free and essential applications that I always install for other people. These applications all seem to fill essential functions and they all seem to be well-behaved installers and uninstallers, in other words it won't crash your computer or...
Source: http://blogs.zdnet.com/Ou/?p=989