416 News Story Topics
Remove Filter ![]() | |
What's more stable than a rock, faster than a spinning disk, more powerful than a Windows system twice its size, and able to leap platforms like no other operating system? Surprise! It's Linux. It's also recession proof. Can that be true? Yes, and here are the 5 reasons why: [B]1. … Networking client-server finance microsoft redhat virtualization | |
How many passwords do you have to remember? The common answer is either too many and I sometimes forget them, or alternatively just the one as I use it for everything. Both options are bad in terms of security. Which is where password management systems come in, and these can … Networking cybersecurity encryption smartphone web-browser | |
Security experts [URL="http://www.mcafee.com"]McAfee[/URL] confirm what we already know: when the [URL="http://www.daniweb.com/blogs/entry3023.html"]economy starts to hurt[/URL], the purveyors of malware jump in to increase the pain. With the revelation of it's 2009 threat predictions, McAfee looks ahead to a dismal year of continuing cyberthreats. Like I say, with no hint of surprise … Networking cybersecurity finance flash legal storage | |
The Bush administration was [URL="http://www.gwu.edu/~nsarchiv/news/20090114/order_20090114.pdf"]ordered this week[/URL] to take a number of steps intended to help preserve email messages sent between 2003 and 2005 that had been thought to have been deleted -- but the way the court order was phrased offers a number of loopholes to avoid the intent … Networking cybersecurity email politics | |
It occurs to me that I've been talking a lot on this blog about data going missing here in the UK. I've given our Government and various people a hard time - if they cared what I said it'd hurt. I've said these things are managerial rather than technical. And … Networking cybersecurity data-protection pc-peripheral smartphone | |
I shudder when I look at some of the losses there have been in data and then the amount of people who complain that it's all down to computers. Here's a big secret; it isn't. Late last years someone bought a system on eBay which had loads of private information … Networking cybersecurity data-protection hard-drive | |
It looks ever more likely that 2009 could indeed be the [URL="http://www.daniweb.com/blogs/entry3781.html"]year of the scam[/URL]. Symantec owned MessageLabs is warning that cases of advance fee [URL="http://www.daniweb.com/blogs/entry1198.html"]419 fraud[/URL], along with other financial scams, have spiked as we enter 2009. From December 22nd 2008, through into January 2009, the number of scams … Networking abuse cybersecurity | |
Gary McKinnon, the British hacker who is still fighting against extradition to the US despite the European Court of Human Rights ruling he should go, has played yet another card in his battle for justice in the UK. Apparently, lawyers representing McKinnon have told the British Crown Prosecution Service that … Networking cybersecurity | |
A group of over 30 organizations including the Department of Homeland Security, Microsoft, and Symantec collaborated recently on a security project designed to identify the [URL="http://www.sans.org/top25errors//?cat=top25"]top 25 coding errors[/URL] programmers make when building Web sites. Since many of the mistakes can leave sites vulnerable to to cyber crime, it's a … Networking cybersecurity | |
If you work in IT support you pretty much learn to expect the unexpected, but nobody could have seen some of these little gems, just [URL="http://www.pandalabs.com"]revealed[/URL] by the Panda Security tech support team, coming. For example, how about the customer who wondered if Panda antivirus software could be blowing the … Networking cybersecurity | |
The [URL="http://www.e-victims.org"]E-Victims Organisation[/URL], a non-for-profit UK community interest company set up to benefit Internet users by assisting the victims of e-crime after the event, has released a top 10 Internet Scams of 2009 predictions list. Indeed, E-Victims.Org goes as far as to suggest that with new scams appearing almost daily, … Networking abuse advertising cybersecurity | |
Sophos, the security outfit, has issued a [URL="http://www.sophos.com/blogs/gc/g/2009/01/04/phishing-scam"]warning[/URL] for users of Twitter to be on the lookout for an evolving phishing attack which could steal personal data if they are not very careful. Already thousands of Twitterers are thought to have received messages from their friends which invite them to … Networking abuse cybersecurity iphone social-media | |
Ever wondered what the most popular passwords being used are? Ever wondered what the crappiest, most insecure passwords being used are? Hey, you are in luck as it seems the two lists are exactly the same. The What's My Pass 'Top 500 Worst Passwords of All Time' [URL="http://www.whatsmypass.com/?p=415"]list[/URL] makes for … Networking cybersecurity | |
According to an application vulnerability specialist, Fortify Software, HUB Computer Systems in the US has been hit by a $52,000 phone bill following the [URL="http://www.itexaminer.com/hacking-victim-hit-with-52000-phone-bill.aspx"]unauthorised access[/URL] of the company IP-enabled PBX by hackers. "The advent of IP-enabled PBXs, and the facility of remotely- programmable `conventional' PBX systems, means that hackers … Networking cybersecurity | |
[URL="http://www.messagelabs.com"]MessageLabs[/URL] Intelligence data reveals that, in an announcement that will probably come as no shock to anyone who actually uses the Internet, the average [URL="http://www.daniweb.com/blogs/entry2459.html"]spam[/URL] level for the year managed to hit 81.2 percent. Perhaps a little more surprisingly, especially given the number of security vendor [URL="http://www.daniweb.com/blogs/entry3419.html"]warnings[/URL] throughout 2008, [URL="http://www.itwire.com/content/view/18997/53/"]malware … Networking abuse cybersecurity virus-malware | |
Joe "Zonker"Brockmeier is the Community Manager for openSUSE. He has been involved with Free and Open Source Software (FOSS) since 1996 when he discovered FOSS while a college student and was hooked. For most of his career he has worked as a technology journalist covering Linux and open source topics. … Networking client-server open-source suse | |
Although you might think that your personal information, including your financial data, is hugely valuable to the cyber-criminal fraternity the truth would appear to be somewhat different. Security vendor [URL="http://www.trendmicro.co.uk"]Trend Micro[/URL] has published research which shows that at this time of the year, as we fast approach the climax to … Networking cybersecurity virus-malware | |
Oh terrific. Just when we thought things were winding down for the festive season, Microsoft users are advised not to use Internet Explorer until a major security vulnerability is plugged. Clearly I agree, but I'd add a second plea - when you've cross-graded to Chrome, Firefox, Opera or whatever else, … Networking cybersecurity microsoft web-browser | |
It's an annual event: Churches and other facilities putting out creches and other displays for Christmas find parts of it -- typically the baby Jesus -- stolen, with both a financial and a sentimental cost. Now, those facilities are equipping their baby Jesuses with GPS in order to track them … Networking cybersecurity | |
Forgive the guffaws of uncontrolled laughter from over here. I've just seen that the US Government - January Obama edition - is considering making IT security a matter for its specific attention and put someone in charge of Cybercrime. So why the laughter from the UK? Yes, I can understand … Networking cybersecurity data-protection politics | |
[URL="http://www.daniweb.com/blogs/entry2289.html"]Facebook spam[/URL] is nothing news, nor for that matter is [URL="http://www.itpro.co.uk/blogs/daveyw/2008/01/03/one-million-facebook-users-exposed-to-zango-worm/"]Facebook malware[/URL]. While we are on a nothing new about Facebook theme, ever [URL="http://www.itpro.co.uk/blogs/editorial-blogs/davey-winder/922815/grownups-invade-facebook.thtml"]since grown-ups started to invade[/URL] the social network has suffered a tad from 'phoney friend syndrome.' I mean, come on, do you really think that [URL="http://www.itwire.com/content/view/20618/53/"]Barack Obama … Networking cybersecurity social-media | |
The IBM Internet Security Systems division, better known simply as ISS, has today warned of the 'perfect storm' of security threats which has been created by the global economic slowdown, an unprecedented level of cybercrime activity and both the cost and complexity of legal security infrastructures. ISS announced a set … Networking cybersecurity legal | |
The fact that Apple is now encouraging people to use antivirus software on its systems is to be welcomed. I use a Mac myself but I'm regularly disturbed by the number of fellow users who refuse utterly to use AV because 'there aren't any viruses, they're all on the PC' … Networking apple cybersecurity virus-malware | |
Ever had some computer malware spit a bunch of porn onto your screen? Now imagine it happening in a roomful of schoolchildren. Now imagine it could send you to jail -- for forty years. That's what happened to Julie Amero, a substitute teacher in Norwich, Conn., in 2004. Using a … Networking cybersecurity politics virus-malware | |
If you ever had a big brother, you know that the same guy who gave you noogies could also protect you from a bully at school -- but you had to take the bad with the good. 'Big Brother,' in surveillance, is the same way. Government surveillance is getting easier … Networking cybersecurity | |
The invaluable Tech Ticker pour more gasoline on the fire we started yesterday on the historical decline of the U.S. stock market in 2008. Says TT; "Any way you slice it, the 2008 is shaping up to annus horribilis for the U.S. stock market. Heading into Friday's session, in which … Networking legal session streaming-service | |
Ubuntu and CentOS are now in the [url=http://www.rpath.com/corp/]rPath[/url]. The company yesterday began shipping a version of its [url=http://www.rpath.com/corp/products/rbuilder]rBuilder[/url] build and release management system for Linux that adds those distros; the tool previously worked only with [url=http://www.novell.com/linux/]Novell SUSE Linux Enterprise[/url] and its own [url=http://www.rpath.com/rbuilder/project/rpath/]rPath Linux[/url]. rBuilder packages a Linux application with … Networking engineering novell operating-system redhat suse ubuntu | |
What happens when your security software thinks your operating system is out to get you? Users of AVG8 discovered the answer when it decided that a Windows XP user32.dll system file was infected with a Trojan, and deleted it. Uh oh Buck, biddly biddly biddly. What happens when you delete … Networking cybersecurity daniweb-bug microsoft virus-malware windows-xp | |
Isn't anything safe from hackers? Now they've apparently found a way to hack into systems through a media stream, threatening users with denial of service attacks that can bring down servers and desktops alike. The vulnerability was reported yesterday by VoIPshield Laboratories, a security tools maker in Canada. The flaws … Networking audio cybersecurity microsoft video | |
According to the fourth [URL="http://www.arbornetworks.com/report"]Worldwide Infrastructure Security Report[/URL] from Arbor Networks, published today, malicious attacks on networks are continuing to rise at an alarming rate. While that is no great surprise, the fact that during 2008 Distributed Denial of Service attacks have peaked at 40 Gbps most certainly is. Arbor's … Networking cybersecurity | |
Hey, now that is pretty cool! Hot on the heels of a [URL="http://www.itwire.com/content/view/21585/53/"]report[/URL] suggesting that some 280 million people around the world have suffered some kind of data loss (through theft or incompetence mainly) during the last three years, Dell just might have the answer. It would appear to be … Networking cybersecurity encryption laptop | |
There are 5 things that every good Linux Administrator knows. Do you know what they are? They are in no particular order of importance: [B]1. Users are a Necessary Evil[/B] - Do you ever wonder why System Administrators seem so annoyed by you and your questions? It's because you are, … Networking career cybersecurity lan-wan operating-system unix | |
It's ironic in many ways that UK firms are asking for more help with IT security. The link is [URL="http://news.bbc.co.uk/1/hi/technology/7702823.stm"]here[/URL] but that's the basics of it - Brits aren't happy with what the Government is doing to prevent Cybercrime, particularly in the business world. Well, OK, there's always more to … Networking cybersecurity | |
According to a new [URL="http://www.FaceTime.com/survey08/summary"]report[/URL] by FaceTime, an Internet applications control specialist, the number of data leaks and malware incidents continues to rise as employees continue to embrace the whole Web 2.0 thing within the workplace. In fact, FaceTime says, the use of such applications is so widespread that some … Networking cybersecurity social-media | |
There are three Linux distributions that didn't make it into my [URL="http://www.daniweb.com/blogs/entry3322.html"]top 10 list[/URL] of best Linux distributions but they are ones to watch. These three distributions are all aimed at the Desktop, are simple to install and use, and they're free. [URL="http://www.linuxmint.com"]Linux Mint[/URL], [URL="http://www.thinkgos.com"]gOS[/URL], and [URL="http://www.opensuse.org"]OpenSuSE[/URL] are the three … Networking client-server daniweb-feedback debian novell operating-system os-x suse ubuntu | |
Here we go again. It seems like only last week (there's probably a reason for that) that I was at my desk talking about the amount of alarmist stuff about malware that's out there on the Internet. You know how it goes; someone proves in a lab that something can … Networking cybersecurity virus-malware | |
Security outfit MessageLabs today warns that as the credit crisis worsens so there has been a shift to the online arena for making money via spoofing banks for phishing scams. Between August and September this kind of phishing attack grew by 16 percent, but during September and October it has … Networking abuse cybersecurity | |
The New York Times ran an in-depth article recently detailing the [URL="http://www.nytimes.com/2008/10/13/technology/business-computing/13thin.html?partner=rssnyt&emc=rss"]impact of thin client technology in the workplace[/URL]. The story takes a look at the reasons why the idea has had trouble getting off the ground during the last 15 years, and why it's suddenly gaining traction now. Author … Networking client-server cybersecurity iphone smartphone | |
According to Russian forensic security experts and 'password recovery' specialists ElcomSoft, the days of protecting documents and files with 40-bit encryption are now officially over. It has now released a product which uses Thunder Tables technology to unlock password-protected documents that have been created using Microsoft Word. In fact, it … Networking encryption microsoft | |
Last Saturday, Republican vice presidential nominee and Alaska Governor Sarah Palin held a rally in Los Angeles in the Home Depot Center, and the California Democratic Party rented a giant electronic billboard during the event, and solicited questions from people, via texting, to display during the presentation (exhorting submitters to … Networking cybersecurity engineering flash politics | |
How on earth can you 'lose' the names, addresses, dates of birth, email addresses and, one has to assume, the mobile phone numbers of some 17 million of your customers? It's a good question, and to get the answer you might want to shout it in the direction of T-Mobile … Networking cybersecurity data-protection storage | |
As unlikely as it may sound, Elvis Presley has been cloned. OK, it's a fair cop, not your actual Elvis Presley but rather his passport. According to reports a gang of Dutch hackers have managed to clone RFID driven e-passports of the type we are always being told are highly … Networking cybersecurity | |
Peter Wood admits he walked unchallenged into an insurance company and was able to steal all their data. He is not in trouble though, it was part of a security exercise and he was hired to try and steal that data. Of course, as Wood says, very often companies "unwittingly … Networking cybersecurity operating-system | |
On the face of it it's excellent news that Microsoft and the Washington State Attorney General are fighting against web scams. The sort of scam they're looking at is pretty clever if you're an inexperienced user. You're surfing a website or three - never mind what sort, we're not here … Networking abuse cybersecurity microsoft | |
Effective Wednesday, October 1, each business in Nevada must encrypt customers’ personal information when it is transmitted outside the business’ secure network, such as when it's transmitted over wifi. Initially passed in October 2007, it was said to have been the [URL="http://www.privsecblog.com/archives/state-legislation-some-state-data-encryption-requirements-more-effective-than-others.html"]first law[/URL] of this type. The Commonwealth of Massachusetts … Networking cybersecurity encryption politics | |
Sun Microsystems managed to fix multiple security vulnerabilities in JDK and JRE months ago now, so why has it taken Apple so long to finally plug pretty much the same Java holes in Mac OS X? Apple has known that its Java implementation has been, quite frankly, screwed since way … Networking apple cybersecurity java os-x | |
We were all treated this week to a lovely example of why it's a good idea to use standard email for government business (or corporate business, for that matter). First, Republican vice presidential nominee Sarah Palin mentioned that [URL="http://www.washingtonpost.com/wp-dyn/content/article/2008/09/09/AR2008090903044.html"]she used Yahoo Mail[/URL] for some of her email, which is a … Networking cybersecurity email politics | |
I've been doing a piece lately that's involved me talking to a number of IT support types and they're all coming out with similar comments and views: too many managers, they're saying, are declaring that something is an IT issue when actually it's no such thing, it's a management thing. … Networking data-protection | |
Yesterday I was having breakfast in Madrid, as you do, enjoying the 30 degree heat and the ice cold orange juice. I was also enjoying the opportunity to be my usual grumpy self and throw awkward questions in the direction of my breakfast companion, Con Mallon the Director of Regional … Networking cybersecurity perl | |
Microsoft yesterday released a [url=http://support.microsoft.com/kb/954593]security update[/url] intended to fix eight critical vulnerabilities in as many as 42 Windows apps and components, including IE6, Media Player, Office, SQL Server and Visual Studio. The patch was made available before they could be discovered and exploited by malicious hackers, or at least before … |
The End.