416 News Story Topics

Remove Filter
Member Avatar for
Member Avatar for khess

What's more stable than a rock, faster than a spinning disk, more powerful than a Windows system twice its size, and able to leap platforms like no other operating system? Surprise! It's Linux. It's also recession proof. Can that be true? Yes, and here are the 5 reasons why: [B]1. …

Member Avatar for Rashakil Fol
0
354
Member Avatar for happygeek

How many passwords do you have to remember? The common answer is either too many and I sometimes forget them, or alternatively just the one as I use it for everything. Both options are bad in terms of security. Which is where password management systems come in, and these can …

Member Avatar for TheSatyamite
0
413
Member Avatar for happygeek

Security experts [URL="http://www.mcafee.com"]McAfee[/URL] confirm what we already know: when the [URL="http://www.daniweb.com/blogs/entry3023.html"]economy starts to hurt[/URL], the purveyors of malware jump in to increase the pain. With the revelation of it's 2009 threat predictions, McAfee looks ahead to a dismal year of continuing cyberthreats. Like I say, with no hint of surprise …

0
236
Member Avatar for slfisher

The Bush administration was [URL="http://www.gwu.edu/~nsarchiv/news/20090114/order_20090114.pdf"]ordered this week[/URL] to take a number of steps intended to help preserve email messages sent between 2003 and 2005 that had been thought to have been deleted -- but the way the court order was phrased offers a number of loopholes to avoid the intent …

Member Avatar for caravantech
0
180
Member Avatar for GuyClapperton

It occurs to me that I've been talking a lot on this blog about data going missing here in the UK. I've given our Government and various people a hard time - if they cared what I said it'd hurt. I've said these things are managerial rather than technical. And …

Member Avatar for GuyClapperton
0
194
Member Avatar for GuyClapperton

I shudder when I look at some of the losses there have been in data and then the amount of people who complain that it's all down to computers. Here's a big secret; it isn't. Late last years someone bought a system on eBay which had loads of private information …

Member Avatar for Rashakil Fol
0
150
Member Avatar for happygeek

It looks ever more likely that 2009 could indeed be the [URL="http://www.daniweb.com/blogs/entry3781.html"]year of the scam[/URL]. Symantec owned MessageLabs is warning that cases of advance fee [URL="http://www.daniweb.com/blogs/entry1198.html"]419 fraud[/URL], along with other financial scams, have spiked as we enter 2009. From December 22nd 2008, through into January 2009, the number of scams …

Networking abuse cybersecurity
Member Avatar for Rashakil Fol
0
251
Member Avatar for newsguy

Gary McKinnon, the British hacker who is still fighting against extradition to the US despite the European Court of Human Rights ruling he should go, has played yet another card in his battle for justice in the UK. Apparently, lawyers representing McKinnon have told the British Crown Prosecution Service that …

Networking cybersecurity
0
195
Member Avatar for Lisa Hoover

A group of over 30 organizations including the Department of Homeland Security, Microsoft, and Symantec collaborated recently on a security project designed to identify the [URL="http://www.sans.org/top25errors//?cat=top25"]top 25 coding errors[/URL] programmers make when building Web sites. Since many of the mistakes can leave sites vulnerable to to cyber crime, it's a …

Networking cybersecurity
0
202
Member Avatar for happygeek

If you work in IT support you pretty much learn to expect the unexpected, but nobody could have seen some of these little gems, just [URL="http://www.pandalabs.com"]revealed[/URL] by the Panda Security tech support team, coming. For example, how about the customer who wondered if Panda antivirus software could be blowing the …

Networking cybersecurity
0
314
Member Avatar for happygeek

The [URL="http://www.e-victims.org"]E-Victims Organisation[/URL], a non-for-profit UK community interest company set up to benefit Internet users by assisting the victims of e-crime after the event, has released a top 10 Internet Scams of 2009 predictions list. Indeed, E-Victims.Org goes as far as to suggest that with new scams appearing almost daily, …

0
320
Member Avatar for happygeek

Sophos, the security outfit, has issued a [URL="http://www.sophos.com/blogs/gc/g/2009/01/04/phishing-scam"]warning[/URL] for users of Twitter to be on the lookout for an evolving phishing attack which could steal personal data if they are not very careful. Already thousands of Twitterers are thought to have received messages from their friends which invite them to …

0
175
Member Avatar for happygeek

Ever wondered what the most popular passwords being used are? Ever wondered what the crappiest, most insecure passwords being used are? Hey, you are in luck as it seems the two lists are exactly the same. The What's My Pass 'Top 500 Worst Passwords of All Time' [URL="http://www.whatsmypass.com/?p=415"]list[/URL] makes for …

Networking cybersecurity
Member Avatar for fire_munki
0
295
Member Avatar for newsguy

According to an application vulnerability specialist, Fortify Software, HUB Computer Systems in the US has been hit by a $52,000 phone bill following the [URL="http://www.itexaminer.com/hacking-victim-hit-with-52000-phone-bill.aspx"]unauthorised access[/URL] of the company IP-enabled PBX by hackers. "The advent of IP-enabled PBXs, and the facility of remotely- programmable `conventional' PBX systems, means that hackers …

Networking cybersecurity
0
231
Member Avatar for happygeek

[URL="http://www.messagelabs.com"]MessageLabs[/URL] Intelligence data reveals that, in an announcement that will probably come as no shock to anyone who actually uses the Internet, the average [URL="http://www.daniweb.com/blogs/entry2459.html"]spam[/URL] level for the year managed to hit 81.2 percent. Perhaps a little more surprisingly, especially given the number of security vendor [URL="http://www.daniweb.com/blogs/entry3419.html"]warnings[/URL] throughout 2008, [URL="http://www.itwire.com/content/view/18997/53/"]malware …

0
126
Member Avatar for Techwriter10

Joe "Zonker"Brockmeier is the Community Manager for openSUSE. He has been involved with Free and Open Source Software (FOSS) since 1996 when he discovered FOSS while a college student and was hooked. For most of his career he has worked as a technology journalist covering Linux and open source topics. …

0
514
Member Avatar for happygeek

Although you might think that your personal information, including your financial data, is hugely valuable to the cyber-criminal fraternity the truth would appear to be somewhat different. Security vendor [URL="http://www.trendmicro.co.uk"]Trend Micro[/URL] has published research which shows that at this time of the year, as we fast approach the climax to …

Member Avatar for sblsoftware
0
185
Member Avatar for GuyClapperton

Oh terrific. Just when we thought things were winding down for the festive season, Microsoft users are advised not to use Internet Explorer until a major security vulnerability is plugged. Clearly I agree, but I'd add a second plea - when you've cross-graded to Chrome, Firefox, Opera or whatever else, …

0
159
Member Avatar for slfisher

It's an annual event: Churches and other facilities putting out creches and other displays for Christmas find parts of it -- typically the baby Jesus -- stolen, with both a financial and a sentimental cost. Now, those facilities are equipping their baby Jesuses with GPS in order to track them …

Networking cybersecurity
0
141
Member Avatar for GuyClapperton

Forgive the guffaws of uncontrolled laughter from over here. I've just seen that the US Government - January Obama edition - is considering making IT security a matter for its specific attention and put someone in charge of Cybercrime. So why the laughter from the UK? Yes, I can understand …

0
149
Member Avatar for newsguy

[URL="http://www.daniweb.com/blogs/entry2289.html"]Facebook spam[/URL] is nothing news, nor for that matter is [URL="http://www.itpro.co.uk/blogs/daveyw/2008/01/03/one-million-facebook-users-exposed-to-zango-worm/"]Facebook malware[/URL]. While we are on a nothing new about Facebook theme, ever [URL="http://www.itpro.co.uk/blogs/editorial-blogs/davey-winder/922815/grownups-invade-facebook.thtml"]since grown-ups started to invade[/URL] the social network has suffered a tad from 'phoney friend syndrome.' I mean, come on, do you really think that [URL="http://www.itwire.com/content/view/20618/53/"]Barack Obama …

0
189
Member Avatar for newsguy

The IBM Internet Security Systems division, better known simply as ISS, has today warned of the 'perfect storm' of security threats which has been created by the global economic slowdown, an unprecedented level of cybercrime activity and both the cost and complexity of legal security infrastructures. ISS announced a set …

Networking cybersecurity legal
0
299
Member Avatar for GuyClapperton

The fact that Apple is now encouraging people to use antivirus software on its systems is to be welcomed. I use a Mac myself but I'm regularly disturbed by the number of fellow users who refuse utterly to use AV because 'there aren't any viruses, they're all on the PC' …

0
188
Member Avatar for slfisher

Ever had some computer malware spit a bunch of porn onto your screen? Now imagine it happening in a roomful of schoolchildren. Now imagine it could send you to jail -- for forty years. That's what happened to Julie Amero, a substitute teacher in Norwich, Conn., in 2004. Using a …

Member Avatar for slfisher
0
468
Member Avatar for slfisher

If you ever had a big brother, you know that the same guy who gave you noogies could also protect you from a bully at school -- but you had to take the bad with the good. 'Big Brother,' in surveillance, is the same way. Government surveillance is getting easier …

Networking cybersecurity
0
409
Member Avatar for Brian.oco

The invaluable Tech Ticker pour more gasoline on the fire we started yesterday on the historical decline of the U.S. stock market in 2008. Says TT; "Any way you slice it, the 2008 is shaping up to annus horribilis for the U.S. stock market. Heading into Friday's session, in which …

0
180
Member Avatar for EddieC

Ubuntu and CentOS are now in the [url=http://www.rpath.com/corp/]rPath[/url]. The company yesterday began shipping a version of its [url=http://www.rpath.com/corp/products/rbuilder]rBuilder[/url] build and release management system for Linux that adds those distros; the tool previously worked only with [url=http://www.novell.com/linux/]Novell SUSE Linux Enterprise[/url] and its own [url=http://www.rpath.com/rbuilder/project/rpath/]rPath Linux[/url]. rBuilder packages a Linux application with …

0
238
Member Avatar for newsguy

What happens when your security software thinks your operating system is out to get you? Users of AVG8 discovered the answer when it decided that a Windows XP user32.dll system file was infected with a Trojan, and deleted it. Uh oh Buck, biddly biddly biddly. What happens when you delete …

Member Avatar for Anthea_123
0
198
Member Avatar for EddieC

Isn't anything safe from hackers? Now they've apparently found a way to hack into systems through a media stream, threatening users with denial of service attacks that can bring down servers and desktops alike. The vulnerability was reported yesterday by VoIPshield Laboratories, a security tools maker in Canada. The flaws …

Member Avatar for baandow
0
254
Member Avatar for happygeek

According to the fourth [URL="http://www.arbornetworks.com/report"]Worldwide Infrastructure Security Report[/URL] from Arbor Networks, published today, malicious attacks on networks are continuing to rise at an alarming rate. While that is no great surprise, the fact that during 2008 Distributed Denial of Service attacks have peaked at 40 Gbps most certainly is. Arbor's …

Networking cybersecurity
0
194
Member Avatar for newsguy

Hey, now that is pretty cool! Hot on the heels of a [URL="http://www.itwire.com/content/view/21585/53/"]report[/URL] suggesting that some 280 million people around the world have suffered some kind of data loss (through theft or incompetence mainly) during the last three years, Dell just might have the answer. It would appear to be …

0
153
Member Avatar for khess

There are 5 things that every good Linux Administrator knows. Do you know what they are? They are in no particular order of importance: [B]1. Users are a Necessary Evil[/B] - Do you ever wonder why System Administrators seem so annoyed by you and your questions? It's because you are, …

Member Avatar for mebinouseph
0
521
Member Avatar for GuyClapperton

It's ironic in many ways that UK firms are asking for more help with IT security. The link is [URL="http://news.bbc.co.uk/1/hi/technology/7702823.stm"]here[/URL] but that's the basics of it - Brits aren't happy with what the Government is doing to prevent Cybercrime, particularly in the business world. Well, OK, there's always more to …

Networking cybersecurity
0
91
Member Avatar for happygeek

According to a new [URL="http://www.FaceTime.com/survey08/summary"]report[/URL] by FaceTime, an Internet applications control specialist, the number of data leaks and malware incidents continues to rise as employees continue to embrace the whole Web 2.0 thing within the workplace. In fact, FaceTime says, the use of such applications is so widespread that some …

0
107
Member Avatar for khess

There are three Linux distributions that didn't make it into my [URL="http://www.daniweb.com/blogs/entry3322.html"]top 10 list[/URL] of best Linux distributions but they are ones to watch. These three distributions are all aimed at the Desktop, are simple to install and use, and they're free. [URL="http://www.linuxmint.com"]Linux Mint[/URL], [URL="http://www.thinkgos.com"]gOS[/URL], and [URL="http://www.opensuse.org"]OpenSuSE[/URL] are the three …

Member Avatar for Junyah
0
551
Member Avatar for GuyClapperton

Here we go again. It seems like only last week (there's probably a reason for that) that I was at my desk talking about the amount of alarmist stuff about malware that's out there on the Internet. You know how it goes; someone proves in a lab that something can …

Member Avatar for jbennet
0
126
Member Avatar for happygeek

Security outfit MessageLabs today warns that as the credit crisis worsens so there has been a shift to the online arena for making money via spoofing banks for phishing scams. Between August and September this kind of phishing attack grew by 16 percent, but during September and October it has …

Networking abuse cybersecurity
0
236
Member Avatar for Lisa Hoover

The New York Times ran an in-depth article recently detailing the [URL="http://www.nytimes.com/2008/10/13/technology/business-computing/13thin.html?partner=rssnyt&emc=rss"]impact of thin client technology in the workplace[/URL]. The story takes a look at the reasons why the idea has had trouble getting off the ground during the last 15 years, and why it's suddenly gaining traction now. Author …

Member Avatar for OlyComputers
0
129
Member Avatar for newsguy

According to Russian forensic security experts and 'password recovery' specialists ElcomSoft, the days of protecting documents and files with 40-bit encryption are now officially over. It has now released a product which uses Thunder Tables technology to unlock password-protected documents that have been created using Microsoft Word. In fact, it …

Networking encryption microsoft
0
287
Member Avatar for slfisher

Last Saturday, Republican vice presidential nominee and Alaska Governor Sarah Palin held a rally in Los Angeles in the Home Depot Center, and the California Democratic Party rented a giant electronic billboard during the event, and solicited questions from people, via texting, to display during the presentation (exhorting submitters to …

0
120
Member Avatar for happygeek

How on earth can you 'lose' the names, addresses, dates of birth, email addresses and, one has to assume, the mobile phone numbers of some 17 million of your customers? It's a good question, and to get the answer you might want to shout it in the direction of T-Mobile …

0
168
Member Avatar for newsguy

As unlikely as it may sound, Elvis Presley has been cloned. OK, it's a fair cop, not your actual Elvis Presley but rather his passport. According to reports a gang of Dutch hackers have managed to clone RFID driven e-passports of the type we are always being told are highly …

Networking cybersecurity
Member Avatar for tiger86
0
143
Member Avatar for newsguy

Peter Wood admits he walked unchallenged into an insurance company and was able to steal all their data. He is not in trouble though, it was part of a security exercise and he was hired to try and steal that data. Of course, as Wood says, very often companies "unwittingly …

0
105
Member Avatar for GuyClapperton

On the face of it it's excellent news that Microsoft and the Washington State Attorney General are fighting against web scams. The sort of scam they're looking at is pretty clever if you're an inexperienced user. You're surfing a website or three - never mind what sort, we're not here …

0
204
Member Avatar for slfisher

Effective Wednesday, October 1, each business in Nevada must encrypt customers’ personal information when it is transmitted outside the business’ secure network, such as when it's transmitted over wifi. Initially passed in October 2007, it was said to have been the [URL="http://www.privsecblog.com/archives/state-legislation-some-state-data-encryption-requirements-more-effective-than-others.html"]first law[/URL] of this type. The Commonwealth of Massachusetts …

0
126
Member Avatar for happygeek

Sun Microsystems managed to fix multiple security vulnerabilities in JDK and JRE months ago now, so why has it taken Apple so long to finally plug pretty much the same Java holes in Mac OS X? Apple has known that its Java implementation has been, quite frankly, screwed since way …

Member Avatar for IsaacU
0
254
Member Avatar for slfisher

We were all treated this week to a lovely example of why it's a good idea to use standard email for government business (or corporate business, for that matter). First, Republican vice presidential nominee Sarah Palin mentioned that [URL="http://www.washingtonpost.com/wp-dyn/content/article/2008/09/09/AR2008090903044.html"]she used Yahoo Mail[/URL] for some of her email, which is a …

0
409
Member Avatar for GuyClapperton

I've been doing a piece lately that's involved me talking to a number of IT support types and they're all coming out with similar comments and views: too many managers, they're saying, are declaring that something is an IT issue when actually it's no such thing, it's a management thing. …

Networking data-protection
Member Avatar for harry4321
0
332
Member Avatar for happygeek

Yesterday I was having breakfast in Madrid, as you do, enjoying the 30 degree heat and the ice cold orange juice. I was also enjoying the opportunity to be my usual grumpy self and throw awkward questions in the direction of my breakfast companion, Con Mallon the Director of Regional …

Networking cybersecurity perl
Member Avatar for Diguelo
0
178
Member Avatar for EddieC

Microsoft yesterday released a [url=http://support.microsoft.com/kb/954593]security update[/url] intended to fix eight critical vulnerabilities in as many as 42 Windows apps and components, including IE6, Media Player, Office, SQL Server and Visual Studio. The patch was made available before they could be discovered and exploited by malicious hackers, or at least before …

0
194

The End.