Items tagged with SEC

It's been nearly two years since since Sony got into the rootkit business. Not intentionally, but the DRM installed by Sony BMG CDs when you tried to play them on your PC had rootkit qualities. Not only that, but in a real-life example of the vulnerability, hackers used it to hack World of Warcraft.Unfortunately, it seems Sony did not learn... Read more...
Apple and AT&T have been sued for a second time over the controversial battery replacement plan for the iPhone.  You may recall that last month Jose Trujillo of Melrose Park, Ill. sued the companies for $75,000 in damages over the battery.  Monday a second lawsuit was filed, this time in California, alleging that Apple and AT&T deliberately... Read more...
You may recall earlier in the year the crackdown placed on bloggers by the military, who said that such blogging could pose a security threat by leaking sensitive wartime information.  Yet, haven't we seen huge amounts of sensitive information leaked on the Internet by government agencies?  (Nods head in agreement)  A series of audits has... Read more...
There has been much concern over the security and privacy of social networking sites.  Much of the flak has been directed at the sites themselves.  But a study run by security company Sophos showed, once again, that the real security hole, lies in users.By creating a  fake ID around a green frog name "Freddi Staur" (which is an anagram of... Read more...
Second Life is fairly unique amongst a crowd of Dwarf & Goblin infested online worlds, as it doesn’t focus on gold coins, levels or even experience points.  Residents of Second Life go about a wide array of tasks, almost all of which could be easily done in the real world.  There are still limits to what people can or should do, but scripting... Read more...
A recent article in The Inquirer indicated that ATI, as well as other vendors, had  "particularly badly" written drivers which could expose the Vista kernel to attack.  This afternoon ATI plans to release a new driver package with a critical security fix in response to this issue. "The market recently discovered a potential security... Read more...
NVIDIA Announces Second Quarter Earnings Conference Call SANTA CLARA, CA—NVIDIA Corporation (Nasdaq: NVDA) will host a conference call to discuss its financial results for the second quarter of its fiscal year 2008 on August 9, 2007 at 2:00 PM, Pacific Time. The Company's prepared remarks will be followed by a... Read more...
Advertisers have decided that they want to have a presence in Second Life, even though they don't know what it is, really. Throwing money at a technology you don't understand? Check. Inflated traffic figures?  Check. A vague sense of urgency coupled with 6 and 7 figure outlays? Check. No way to measure return? Check. Hey, look, they've put... Read more...
Have you ever wondered why there are so many viruses and other malware out there just waiting to infect your PC(s)?  Is it really possible that there are so many people these days who have the intelligence and the lack of scruples required to make so many viruses?  Or is it more probable that there are a few bright people out there who have... Read more...
AMD Reports Second Quarter Results – Microprocessor Unit Shipments Increase 22% Year-Over-Year and 38% Sequentially –... Read more...
Intel Second-Quarter Revenue $8.7 Billion Revenue $8.7 Billion, up 8 Percent Year-over-Year Operating Income $1.35 Billion, up 26 Percent Year-over-Year Net Income $1.3 Billion EPS 22 cents... Read more...
Google today announced that it has reached a settlement to acquire Postini, a company that provides clients with security services (protecting instant messaging, e-mail, and other modes of communication). The $625 million deal gives Google access to an established clientele of over 35,000 businesses and 10 million international users, and... Read more...
BlackBerrys can be quite useful for staying in touch, sending media, and even sending business related files.  People might want to draw the line at sensitive government data: "We're not at war with France, at least not the last time I checked, but that doesn't mean that the French want their state secrets coursing through the U.S. telecommunications... Read more...
If you are one of those people who already owns an Apple TV, then you might want to go into your menu and force an update.  The security patch that fixes a buffer overflow issue will not be part of automatic updates at this time. Description: A buffer overflow vulnerability exists in the UPnP IGD (Internet Gateway Device Standardized Device... Read more...
Care to guess how many computer viruses, thefts, hacker break-ins, and other security issues the Department Of Homeland Security has suffered over the past 2 years?  If you guessed over 800, you're a right! "In one instance, hacker tools for stealing passwords and other files were found on two internal Homeland Security computer systems.... Read more...
The UK's Barclays Bank is beginning to use two factor authentification for transactions online to combat fraud. They are supplying 500,000 customers with a PINsentry device that would make it imposible for a phishing scam to clean out your bank account by simply getting their hands on your log-in password. While broadly welcomed,... Read more...
If you've ever wondered about the whys and wherefores behind all the security changes that Microsoft made in Vista (vs. XP), then Ars Technica has a story for you: "Over the years, much has been made of Windows' security or (perceived) lack thereof. Though Microsoft's record has certainly improved in recent years, many industry observers... Read more...
In order to combat crime in a world dominated by technology, the Secret Service has announced the opening of the National Computer Forensic Institute. The institute, to be built in Hoover, Alabama, is scheduled to open in 2008. The plan is to turn out about 900 computer forensic law enforcement officers each year... Read more...
At Microsoft's annual research conference Techfest, a new method to help keep internet services secure was unveiled based on images of cats and dogs. A popular method to determine whether a human or automated software is trying to access an internet service in use today is the Captcha, a series of randomly... Read more...
An interesting video dissecting portions of Job's iPhone introduction at Macworld '07 has surfaced. "While none of this is really groundbreaking information, some of it does further explain how the iPhone functions and even hints at possible future strategies Apple may be taking." Sadly, that statement sums the video up fairly well.... Read more...
Adtron announced that it is now shipping its new generation of Flashpak drives in both SATA and IDE interfaces in the 2.5" form factor. Here's a quick blurb: "Solid state flash disk manufacturer Adtron Corporation, announces today the immediate availability of its most advanced generation of the Adtron... Read more...
All in one computer security seems the way to go now. Too many programs doing not enough things equals compromised security. But let's face it; the real reason to read about Symantec's new Norton 360 security suite is to read all the robo-dweebs yelling at one another in the comments section about their... Read more...
Prev 1 2 3 4 5 Next