IT Week [URL="http://www.itweek.co.uk/itweek/news/2214006/firms-left-behind-criminals"]reports[/URL] that business is just too slow to respond to cyber-criminals, and as a result the hackers are simply worried about their ability to prevent them breaking in. The article quotes Dan Hubbard, the Vice President of Security Research at Websense as saying that from a purely technological perspective "it is almost possible to admire the ways attackers are creating tools and using modern enterprise IT infrastructure to propagate their attacks" and that these are evolving at a faster pace than the security industry. "They haven't got business processes holding them back; they're free to innovate" he added. …

Member Avatar
Member Avatar
+0 forum 3

It's not just [URL="http://www.daniweb.com/news/story231517.html"]phishing scams[/URL] that Facebook users have to worry about right now, According to Roger Thompson, the Chief Research Officer with security vendor AVG, hacked Facebook applications are increasingly reaching out to exploit sites based in Russia. As Thompson says, this is different to the normal run of things whereby people are linking to hacked pages innocently enough on social networking sites. "These seem to be actual Facebook applications that have been hacked" Thompson points out, adding that the application developers are "innocent victims too". AVG researchers first spotted the trend when a fire-fighter simulation game which it …

Member Avatar
Member Avatar
+2 forum 5

Two groups are working to set up a .gay top-level Internet domain, with plans for using some of the proceeds for registering sites in that domain to support gay causes, according to an [URL="http://cityroom.blogs.nytimes.com/2009/10/23/competing-groups-press-for-a-gay-internet-suffix/"]article[/URL] in the [I]New York Times[/I]. While it can cost up to $400,000 to set up a new top-level domain, companies compete for control, because the [URL="http://www.icann.org/en/tlds/select.htm"]Internet Corporation for Assigned Names and Numbers[/URL], which oversees the development and management of the Internet’s unique identifiers, awards the registry rights to just one applicant for each new top-level domain, which can result in millions of dollars per year, the …

Member Avatar
Member Avatar
+0 forum 3

[ATTACH=RIGHT]18613[/ATTACH]The term Net Neutrality has been the subject of heavy discussion for the past several years. The freedom to go where and when we want to on the internet is about to slip away. Big telecoms and internet giants like AT&T, Comcast, Verizon, Time Warner and even Google have met with the government and came up with a set of rules that will allow them to regulate and prioritize what we see on the internet (to say the least). Yesterday Steve Wozniak, the engineer that co-founded Apple Computer, Inc. wrote an open letter the FCC imploring them to keep the …

Member Avatar
Member Avatar
+2 forum 1

The state of Oregon is holding a series of informational meetings in 20 areas around the state to identify the barriers to bringing Internet resources to their community. While obviously meetings are being held in urban locations such as Portland and the state capital of Salem, they are also being held in rural and remote locations such as John Day and Madras (with 5,078 residents, according to the 2000 census). The meetings are part of a [URL="http://www.daniweb.com/news/story234021.html"]project [/URL] funded by the American Recovery and Reinvestment Act of 2009, also known as the stimulus package. Oregon received a $1.6 million Broadband …

Member Avatar
Member Avatar
+0 forum 3

With 2009 coming to an end, it's that time of year when security experts start predicting what the (very near) future will hold in terms of likely threat landscapes. One has bucked the trend of just picking on botnet growth and SEO poisoning, although both are on its list, and instead highlighted the dangers of cloud computing and non-Latin domain names. In a report predictably called Predictions 2010, [URL="http://www.m86security.com/"]M86 Security[/URL] reveals its expectations for Web and messaging-based threats for the coming year based upon extensive research into current threat over the past year coupled with an analysis of the major …

Member Avatar
Member Avatar
+0 forum 2

According to [URL="www.thinkbroadband.com/ipv6"]research conducted by thinkbroadband.com[/URL], there is significant confusion amongst broadband providers not only as to whether they support IPv6 but also as to what it actually is. Surprising, when you consider that IPv6 has been available since 1998 and much written about - [URL="http://www.daniweb.com/news/story218110.html"]including here on DaniWeb[/URL] for many years now. Not surprising, when you consider that only a handful of niche broadband service providers actually support it at the moment. That didn't stop several of the sales teams at broadband providers from incorrectly claiming to be supporting it though, while others responded with such remarks as "is …

Member Avatar
Member Avatar
+0 forum 3

Just because security holes and vulnerabilities get reported to software vendors doesn't mean they are actually patched. A new report from IBM's X-Force security team found that of all the software holes reported in the first half of this year, more than half are still unpatched. IBM's X-Force report is published twice per year and provides an in-depth look at software security from across the spectrum of developers. So far this year, the bug catchers are doing better than the bug squashers. More bugs are being reported, but more are going unpatched. In the first six months of 2010, 4,396 …

Member Avatar
Member Avatar
+0 forum 1

Nations such as Russia and China who have malicious hackers should be held accountable for the actions of those criminals, according to a [URL="http://www.cfr.org/content/publications/attachments/Cybersecurity_CSR56.pdf"]report [/URL]from the [URL="http://en.wikipedia.org/wiki/Council_on_Foreign_Relations"]Council on Foreign Relations[/URL], an independent, nonpartisan membership organization. "Though the United States cannot expect countries to prevent all malicious behavior, it can expect them to secure their networks to a reasonable standard, pass laws outlawing international cyber crime, and have mechanisms in place to act on requests for assistance in shutting down attacks, and investigating and prosecuting them," wrote author Robert Knake. He is the coauthor, with Richard Clarke, of the [URL="http://www.amazon.com/Cyber-War-Threat-National-Security/dp/0061962236/ref=sr_1_1?ie=UTF8&s=books&qid=1283534676&sr=8-1"]book [/URL][I]Cyber …

Member Avatar
Member Avatar
+1 forum 4

This year's version of the Cybersecurity Act was approved by the Senate Committee on Homeland Security and Governmental Affairs after amending it to limit the president's authority in the event of a cyber emergency, [URL="http://thehill.com/blogs/hillicon-valley/technology/105377-senate-homeland-security-committee-approves-cybersecurity-bill-"]reported [/URL][I]The Hill[/I]. The [URL="http://thomas.loc.gov/cgi-bin/query/z?c111:S.3480:"]bill[/URL], sponsored by Sens. Joe Lieberman (I-Conn.), Susan Collins (R-Maine), and Tom Carper (D-Del.), is an update to a bill from [URL="http://www.daniweb.com/news/story220776.html"]last year[/URL] that was also worked on by Senator Jay Rockefeller (D-West Virginia) and Senator Olympia Snowe (R-Maine). At that time, people were concerned about reports that it would give the President a "kill switch" to shut down the Internet, though …

Member Avatar
Member Avatar
+0 forum 3

[ATTACH=RIGHT]17035[/ATTACH]While security professionals constantly fear the big bad hacker breaking into their enterprise and wreaking havoc, the biggest threat to security is sitting inside the company and drawing a paycheck. Cloud and e-mail security specialist [URL="http://www.proofpoint.com/"]Proofpoint[/url] notes in its seventh annual study of data loss prevention (DLP) issues that e-mail is the largest source of data compromise, making up 35 percent of all data loss issues. Employee misuse of work-issued mobile devices and popular social media services like Facebook, LinkedIn, Twitter, video sharing sites, forums and blogs are also resulting in more data loss issues, and are forcing disciplinary actions, …

Member Avatar
Member Avatar
+0 forum 1

Sure, looking for news stories with a search engine can tell you about the past, but a new application might act more like a very comprehensive crystal ball. A search engine prototype created by Yahoo's Barcelona lab lets users look into the future -- sort of.[ATTACH]16945[/ATTACH]The [URL="http://fbmya01.barcelonamedia.org:8080/future/"]application[/URL] was revealed this week as part of the [URL="http://research.microsoft.com/en-us/um/people/ryenw/hcir2010/challenge.html"]Human-Computer Interaction and Information Retrieval challenge[/URL], which uses more than 1.8 million New York Times articles from 1987 to 2007 as its data set. The application is also part of the European project [URL="http://livingknowledge-project.eu/"]LivingKnowledge[/URL]. The Yahoo researchers call their creation "Time Explorer" and describe it …

Member Avatar
Member Avatar
+2 forum 1

[ATTACH=RIGHT]16891[/ATTACH]After a 2009 to forget, the server business is rebounding well, although some segments are doing better than others. [URL="http://www.idc.com/getdoc.jsp?containerId=prUS22467210"]According to market researcher International Data Corp. (IDC)[/URL], worldwide factory revenue for servers grew 11 percent year-over-year in the second quarter of this year to $10.9 billion and unit sales grew 23.8 percent. The difference in revenue and unit sales is attributable to price pressure driving down the average sale price of servers, but after the double digit percentage losses in 2009, it's still welcomed news for server vendors. The 23.8 percent year-over-year growth is also an improvement over Q1, when …

Member Avatar
+1 forum 0

Today [URL="http://www.Starbucks.com"]Starbucks[/URL] announced further details regarding the company's plan to launch a new digital network for their customers. The Starbucks Digital Network will be offered in addition to their free Wi-Fi further enhancing the community coffee shop feel that the company has been aiming for.[ATTACH]16628[/ATTACH]The plan for the Starbucks Digital Network was first previewed back in June but gave few details as to what the content would consist of. Now that the details have been released, Starbucks customers can look forward to a custom Starbucks channel in addition to five other content channels including Wellness, News, Entertainment, Business & Careers, …

Member Avatar
+0 forum 0

[ATTACH=RIGHT]16424[/ATTACH]In its daily briefing for reporters today, Pentagon spokesman Geoff Morrell demanded that [URL="http://wikileaks.org"]WikiLeaks[/URL] return over 15,000 documents that the site has not yet published. He also denied reports that WikiLeaks had asked Department of Defense officials for assistance in going through the as yet unpublished documents. [I]"The Defense Department demands that Wikileaks return immediately to the US government all versions of documents obtained directly or indirectly from the Department of Defense databases or records...The only acceptable course is for Wikileaks to take steps immediately to return all versions of all of these documents to the US government and permanently …

Member Avatar
+0 forum 0

Remember back in 2001 when that 56k chorus of screeches meant you were connecting to the newfangled internet and you screamed at anyone who would pick up the phone? AOL felt pretty good about the stranglehold they had on the online market then. However, it was released yesterday morning (August 4th) that the service provider which helped herd us to the digital renaissance where dot-coms roam, in an ironic turn of events, is getting beat down by the same monster it helped create. [ATTACH]16396[/ATTACH]AOL posted massive $1.41 billion second quarter losses in writedowns after recent sales of both their Bebo …

Member Avatar
+0 forum 0

At the [URL="http://www.blackhat.com/"]Black Hat[/URL] conference in Las Vegas, Barnaby Jack gave a demonstration of how he learned to crack the security of various stand alone ATM's. While they have long been at risk for physical theft (someone stealing or physically breaking into the internal safe of the ATM itself), this is a rather easy security matter; however, as the demonstration showed, securing the ATM's from enterprising hackers may not have been a big enough of a concern for some ATM companies. [ATTACH=right]16232[/ATTACH]Jack, who works for IOActive as the Director of Security Research, bought two stand alone ATM machines and began …

Member Avatar
+0 forum 0

[ATTACH=right]16103[/ATTACH]The past few years, there hasn't been much great news for the airlines to report in those periodical newsletters they send out to their frequent fliers -- unless you count fees for everything, fewer flights and higher fares as good news. But lately, an awful lot of airlines have been thrilled to finally have something new and exciting to report, namely inflight wireless internet and/or cell phone service on more of their planes. Some carriers are even considering offering the new service for free to try and convince fliers that it'll be worth the $5 - $13 they'd prefer to …

Member Avatar
Member Avatar
+0 forum 1

[ATTACH=right]16134[/ATTACH]At [URL="http://googleblog.blogspot.com/2010/07/introducing-google-apps-for-government.html"]today's press conference[/URL], Google announced a new version of its Google Apps productivity suite, [URL="http://www.google.com/apps/intl/en/government/trust.html"]Google Apps For Government[/URL]. The software has been certified as meeting U.S. Government security requirements. Like the Premier version of their suite, the cost is a yearly charge of $50 per user, and includes applications such as Gmail, Google Docs, Google Calendar, and Postini, an e-mail/Web security and archiving service. The certification is a FISMA-Moderate rating, which can be used for sensitive, but not classified data. FISMA stands for the Federal Information Security Management Act passed in 2002 and applies to all information systems used …

Member Avatar
+0 forum 0

[ATTACH=right]16006[/ATTACH][I]Part dedicated professional, part creative thinker and part con man.[/I] On a weekly basis a major corporation’s data is compromised in a most public fashion – in an instant slaughtering consumer confidence and bringing immediate disgrace. Who doesn’t remember the Google Aurora attacks and AT&T’s iPad data leak exposing 114,000 users personal information and costing them millions? Yet unbeknownst to the public, legions of ethical hackers (AKA penetration testers) are quietly pilfering passwords, war-driving, finding vulnerabilities and brute forcing their way into protected systems… and doing so with great ease. How much ease? According to Michael Miora, President & Founder …

Member Avatar
Member Avatar
+0 forum 1

The long summer holidays are over here in the UK, and our kids have pretty much all gone back to school this week. Which is good news for providers of anonymous proxies and bad news for the school network admins trying to prevent students from accessing inappropriate sites. One UK web content filtering specialist, [URL="http://www.bloxx.com"]Bloxx[/URL], is warning that educational institutions should be aware that every year kids are becoming increasingly savvy with regards to bypassing filtering systems. As that knowledge of technology, and in particular the Internet, continues to evolve so the threat to school filtering evolves alongside. Bloxx warns …

Member Avatar
Member Avatar
+0 forum 2

According to a recent survey of Apple iTunes, iPod, iPhone and iPod Touch users, conducted by The NPD Group, more than a quarter of consumers participating had a strong interest in a free cloud-based music option. Many were willing to pay a subscription fee to access their own music libraries from multiple devices and platforms, when asked about their reactions to various music subscription-model concepts. [ATTACH=right]15838[/ATTACH]The "iTunes Usage Report" asked consumers to evaluate a music service offering free and unlimited streaming of content from the consumer's own iTunes library, as well as several paid options for music subscriptions that included …

Member Avatar
+0 forum 0

[ATTACH=right]15786[/ATTACH]At Microsoft's [URL="http://www.digitalwpc.com/"]Worldwide Partner Conference[/URL] in Washington, D.C. this week, the digital diplodocus will announce its lumbering movement into the cloud along with an appeal for its partners to hold hands and make the leap as well. For those partners that are still a little hesitant to make the jump, Microsoft seems more than ready to provide an "encouraging" shove. Sessions at the conference tackle several variations on the theme of making money off the cloud, like "Open Government and the Cloud: A Perfect Storm for Partner Opportunities," "The Cloud Opportunity in Education," and the more straight-forward "Winning the Cloud …

Member Avatar
+0 forum 0

[ATTACH=LEFT]15719[/ATTACH]The Bluetooth Special Interest Group (SIG) has [URL="http://www.bluetooth.com/English/Products/Pages/Low_Energy.aspx?var=homepageHERO=Bluetoothv4.0"]completed[/URL] work on the new Bluetooth 4.0 specification and is officially ready to begin qualifying new devices for use with the technology. The most notable improvement is the support for devices with low-power consumption. This means Bluetooth can now be implemented in a wide range of devices and scenarios that have yet to be tapped until now. The new low-power mode can operate from a coin-cell battery with little effect on the life of the charge. Devices that still rely on the traditional Bluetooth technology can take advantage of this mode by scaling …

Member Avatar
+2 forum 0

Unless you are a techno-luddite of the first order, the chances are that you would agree the Internet has become an integral part of daily life for those blessed with decent access to the thing. But would you agree that broadband access of no less than 1Mbps is your legal right? If you happen to live in Finland, from today it will be. Yes, Finland has become the first country anywhere in the world to make access to the Internet by broadband a legal right for each and every one of its estimated 5,313,399 citizens. But the good news for …

Member Avatar
Member Avatar
+0 forum 2

Just [URL="http://www.daniweb.com/news/story283037.html"]weeks [/URL]after Wikipedia founder Jimmy Wales came under criticism for being overly zealous about removing information, particularly images, that could be considered to be child pornography from the electronic encyclopedia, the site is being accused by Fox News of harboring pedophiles. "Wikipedia has become home base for a loose worldwide network of pedophiles who are campaigning to spin the popular online encyclopedia in their favor and are trying to lure more people into their world, an investigation by FoxNews.com confirms," according to an [URL="http://www.foxnews.com/scitech/2010/06/25/exclusive-pedophiles-find-home-on-wikipedia/#content"]article[/URL] on Fox News. Eek. In reading the article on the investigation, one learns that it …

Member Avatar
Member Avatar
+1 forum 2

Interesting that the US Department of Defense has banned thumb drives. The problem is that they can carry viruses and infect computers - and if your nation's defense depends on these systems (and by extension in the case of the US so does the defense of the rest of the world) they need to be looked after. So no thumb drives, no CDs. Umm...yes. But if you're going to take this seriously let's have a look at other removable storage. Here's a list, top of my head, of potentially virus-carrying items I could lay my hands on in my office …

Member Avatar
Member Avatar
+0 forum 5

Since the BP-contracted Deepwater Horizon oil rig exploded in the Gulf of Mexico on April 20th, killing 11 workers and sending tens of thousands of barrels of oil into the sea every day, the oil industry has been subject to an understandable barrage of bad press. Finding a good news story amongst all of this environmental doom and gloom is, to be fair, pretty tough. However, I think I might just have managed it courtesy of that most unlikely of environmental heroes: the data centre. It would appear that a data centre which was designed and built by Keysource for …

Member Avatar
+0 forum 0

At the State Opening of Parliament, the Queen has been giving her annual speech on behalf of the UK Government. Written by the new Conservative-Liberal Democrat coalition Government itself, much of the speech was devoted to the inevitable cost cutting exercises, the 'Big Society' concept and reform in terms of both the electoral system and Parliament itself. However, one thing amongst an otherwise predictably boring speech came, thankfully, near the start, when Her Majesty stated that "my government will support the [URL="http://www.itpro.co.uk/blogs/daveyw/2010/03/23/looking-beyond-the-broadband-budget/"]introduction of high speed broadband[/URL] access" for the UK. Unfortunately she did not mention that her government will repeal …

Member Avatar
+1 forum 0

All of the applications for the second round of broadband stimulus funding have been posted -- sort of. In the American Recovery and Reinvestment Act of 2009, also known as the stimulus package, Congress appropriated $7.2 billion for broadband grants, loans, and loan guarantees to be administered by the USDA’s Rural Utilities Service (RUS) and the Department of Commerce’s National Telecommunications and Information Administration (NTIA). There are two programs: RUS Broadband Initiatives Program (BIP) and the NTIA Broadband Technology Opportunities Program (BTOP). BIP will make loans and grants for broadband infrastructure projects in rural areas, while BTOP will provide grants …

Member Avatar
+0 forum 0

The End.