Items tagged with SEC

Malware writers sobbed Tuesday as Microsoft announced that it will cease sales of its security product, Windows Live OneCare, as of June 30th, 2009. Instead, Microsoft announced that it would begin shipping a free product, codenamed "Morro," in the second half of 2009. The new offering will be less of a resource hog, according to the press... Read more...
The enterprising lads over at iFixit sure like to take stuff apart. Then again, that's at the heart of their bread-and-butter--they take the risks with potentially broken parts and lost screws so that they can assemble comprehensive DIY guides for instructing you how you can repair your own Apple products, such as MacBooks and iPods. If you... Read more...
Traditional antivirus (AV) testing, such as that done by organizations such as AV-test.org and AV-comparatives.org, uses collections of malware to demonstrate the capabilities of security products. Secunia, on the other hand, focuses on exploits. For example, it has a scanner at its site that will search your system for unpatched vulnerabilities... Read more...
Data breaches are becoming increasingly common and more sophisticated, putting consumers' personal information and financials at risk. Not only can these data breaches lead to identity theft, but some can even lead to money being siphoned out of bank accounts and illegal purchases made on credit cards. The responsibility for preventing these... Read more...
WD SHIPS SECOND-GENERATION GREEN HARD DRIVES WITH SIGNIFICANTLY IMPROVED POWER EFFICIENCY AND PERFORMANCE WD’s Best Selling Eco-friendly WD Caviar Green Drive Continues to be the Most Power-Efficient, Coolest and Quietest 3.5-inch Hard Drive in the Market LAKE FOREST, Calif. - Oct. 1, 2008 - WD (NYSE: WDC) today announced the second-generation... Read more...
It's one thing to see, say, banking information to show up on a hard drive on eBay.  But to see top secret information show up on a digital camera (likely on an SD card) sold on eBay, that's a whole 'nother ball of wax.According to The Sun, an unsuspecting 28-year-old Brit spent a pretty reasonable $31 for a Nikon Coolpix camera, and... Read more...
The security vulnerabilities already discovered in Chrome appear to have been patched by Google. Of course, Google (much like Apple) hasn't provided any release notes, so discovering what's been fixed isn't that easy. Google said, in a group post: We're planning to do release notes. 149.29 is a security update and we released it as fast as... Read more...
Not satisfied with Firefox 3.0.1?  Want to see if Firefox 3.1 is really faster than Chrome, as Mozilla claims (though it's arguable)?  Well, last night Mozille released the second alpha for Firefox 3.1.  Note the word "alpha.:"  Beta is buggy enough, but Alpha starts to stretch the limits a little.Shiretoko Alpha 2 is an... Read more...
If you use a computer on a regular basis, chances are you are running some sort of anti-malware application. If you aren't then you really should be, as recent studies show that malware is becoming more pervasive and more sophisticated. No operating system (OS) is immune from malware attacks, but Microsoft Windows is the most frequently targeted... Read more...
Apparently, Linux kernel creator, Linus Torvalds has no problem expressing his opinion, and did so vehemently via back-and-forth e-mails with the editors of Network World this week. What got Torvalds so heated is his perception of how security vulnerabilities are so incredibly over-hyped to the extent that he calls it a "security circus."... Read more...
Is microvideoblogging the next big thing? "Micro-what?" you say. Picture Twitter, but with video posts instead of text. That's microvideoblogging. Now limit each video post to only 12 seconds long, and that's the idea behind 12seconds.tv. Like Twitter, you can post pretty much anything you want, as long as it doesn't violate the site's terms... Read more...
A study detailed in Nature exposes the local nature of humans: we like to hang around our homes. But that's not what caught our interest. It's the way the study was conducted.Researchers used cell phone towers to track individuals' locations whenever they made or received phone calls and text messages over six months. In a second set of records,... Read more...
BioWare has produced numerous hit games over the years, and as such they’ve probably suffered more than the average company at the hands of pirates. As a result the company has decided to use SecuROM for some of their upcoming titles, and Technical Director Derek French provides some details: “Mass Effect uses SecuROM and requires an online... Read more...
It used to be fairly straightforward choosing a browser. Internet Explorer came bundled with everything, a few hardy souls got on the Firefox bandwagon early, Apple freaks used Safari, and Ron Paul voters used Opera. Since hackers concentrated their attention on the target-rich environment of massed IE users, everybody else benefited from... Read more...
Microsoft Releases Latest Microsoft Security Intelligence Report Company finds use of malicious software increasingly motivated by financial gain. LONDON - Microsoft Corp. today released the fourth volume of its Microsoft Security Intelligence Report (SIR) at Infosecurity Europe 2008. The report focuses on the second half of 2007 and uses... Read more...
A report released Wednesday by Infosecurity Europe revealed that not only is chocolate good bait for getting someone's password, so is an attractive appearance.576 office workers in total were polled by the fake researchers in a bid to raise awareness about information security.  Infosecurity Europe hired attractive “researchers” to hand... Read more...
After reversing their stance on BitTorrent, Comcast has announced plans to offer their 50Mb/sec broadband in all existing markets by 2010. What would people use the extra bandwidth for? Digital distribution of movies and music seems a likely candidate and BitTorrent seems like it is going to be a key player in that arena.  So how fast is a... Read more...
Security researcher Charlie Miller attended the CanSecWest Pwn2Own hacker challenge hoping to make a little money, I'm sure. But I doubt even he had any idea that he could compromise a MacBook Air laptop in two minutes flat and collect a $10,000 prize. Maybe Apple should stop using the picture of the fruit as a logo, and go with an "Easy Button"... Read more...
The British company Thruvision has announced the T5000 Security Imaging System, a camera that can "see" under clothes using what the company calls "passive imaging technology" to identify objects by the natural electromagnetic rays that they emit. The T5000 camera, created by a company called ThruVision, uses what it calls "passive imaging... Read more...
Well, although there's likely a security hole there somewhere, the WSJ Online has accepted Facebook's friend request with the "Seen This?" feature.Hoping to tap into the growing buzz of online social networks, the Journal is adding a feature to its Web site that will allow readers to see which Journal stories are popular among that user's... Read more...
Sharkoon Swift-Case Securita: With RFID encryption to protect against unauthorized access for 2.5" SATA hard drives In order to offer customers the best possible protection against data thieves, Sharkoon is expanding its Swift-Case line up of external hard drive enclosures by adding a model with RFID access control. The Sharkoon Swift-Case... Read more...
It's lots of fun to see all the gaudy and enormous things displayed at the Consumer Electronics Show. But when you see a CEO standing next to a television the size of a roadside billboard that costs more than your last divorce did, you wonder if much of it will ever turn out to be a big hit with the general public. Brier Dudley poked around... Read more...
Prev 1 2 3 4 5 Next