Items tagged with SEC

Could anything else possibly fit the word "ironic" better than this?Part of security software vendor CA's Web site was hacked earlier this week and was redirecting visitors to a malicious Web site hosted in China.Although the problem now appears to have been corrected, cached versions of some pages in the press section of CA.com show that... Read more...
Best year ever (!) for Amazon.com. Amazon.com, Inc. today announced the 2007 holiday season finished as its best ever, with its busiest day being December 10. On that day, Amazon customers ordered more than 5.4 million items, which is 62.5 items per second. In addition, the company wrapped up its second year of Amazon Customers Vote, with... Read more...
Modern PCs are inching closer and closer to having 10 GB/sec or more usable memory bandwidth, and we haven't really had any complaints about the steady increase until we heard that Rambus was working on technology that could enable 1 TB/sec of memory bandwidth.The applications for graphics cards and consoles are certainly interesting, but... Read more...
Yep, not only did the PlayStation 3 get a firmware upgrade today (to 2.0), part of that upgrade includes what Trend Micro says is the first product of its kind for a gaming console.Trend's service is available as part of Sony's 2.00 firmware update for the PS3, also released on Thursday. The service will initially be free for users through... Read more...
The Sectera Edge was developed under the NSA Secure Mobile Environment/Portable Electronic Device program (SME PED) and will eventually be supplied to the DOD and Homeland Security.  It will be able to switch between the government's Secret Internet Protocol Router Network (SIPRNet) and Non-classified Internet Protocol Router Network... Read more...
The words "game software" in a subject always catches our attention.  In this case researchers are trying to teach guards how to randomize their search routes, to better patrol airports.Guards are usually told to patrol in a random fashion but, being human, they tend to form habits that patient criminals can exploit. To help make their... Read more...
Just about everybody has heard of Second Life, and how many retailers have purchased a virtual store and even hawked virtual goods with a real-world likeness.  But a recent report is showing, not surprisingly, that the hype inspired but such stories as mostly that, hype.In fact it seems that Second Life has become less than attractive... Read more...
It's been nearly two years since since Sony got into the rootkit business. Not intentionally, but the DRM installed by Sony BMG CDs when you tried to play them on your PC had rootkit qualities. Not only that, but in a real-life example of the vulnerability, hackers used it to hack World of Warcraft.Unfortunately, it seems Sony did not learn... Read more...
Apple and AT&T have been sued for a second time over the controversial battery replacement plan for the iPhone.  You may recall that last month Jose Trujillo of Melrose Park, Ill. sued the companies for $75,000 in damages over the battery.  Monday a second lawsuit was filed, this time in California, alleging that Apple and AT&T deliberately... Read more...
You may recall earlier in the year the crackdown placed on bloggers by the military, who said that such blogging could pose a security threat by leaking sensitive wartime information.  Yet, haven't we seen huge amounts of sensitive information leaked on the Internet by government agencies?  (Nods head in agreement)  A series of audits has... Read more...
There has been much concern over the security and privacy of social networking sites.  Much of the flak has been directed at the sites themselves.  But a study run by security company Sophos showed, once again, that the real security hole, lies in users.By creating a  fake ID around a green frog name "Freddi Staur" (which is an anagram of... Read more...
Second Life is fairly unique amongst a crowd of Dwarf & Goblin infested online worlds, as it doesn’t focus on gold coins, levels or even experience points.  Residents of Second Life go about a wide array of tasks, almost all of which could be easily done in the real world.  There are still limits to what people can or should do, but scripting... Read more...
A recent article in The Inquirer indicated that ATI, as well as other vendors, had  "particularly badly" written drivers which could expose the Vista kernel to attack.  This afternoon ATI plans to release a new driver package with a critical security fix in response to this issue. "The market recently discovered a potential security... Read more...
NVIDIA Announces Second Quarter Earnings Conference Call SANTA CLARA, CA—NVIDIA Corporation (Nasdaq: NVDA) will host a conference call to discuss its financial results for the second quarter of its fiscal year 2008 on August 9, 2007 at 2:00 PM, Pacific Time. The Company's prepared remarks will be followed by a... Read more...
Advertisers have decided that they want to have a presence in Second Life, even though they don't know what it is, really. Throwing money at a technology you don't understand? Check. Inflated traffic figures?  Check. A vague sense of urgency coupled with 6 and 7 figure outlays? Check. No way to measure return? Check. Hey, look, they've put... Read more...
Have you ever wondered why there are so many viruses and other malware out there just waiting to infect your PC(s)?  Is it really possible that there are so many people these days who have the intelligence and the lack of scruples required to make so many viruses?  Or is it more probable that there are a few bright people out there who have... Read more...
AMD Reports Second Quarter Results – Microprocessor Unit Shipments Increase 22% Year-Over-Year and 38% Sequentially –... Read more...
Intel Second-Quarter Revenue $8.7 Billion Revenue $8.7 Billion, up 8 Percent Year-over-Year Operating Income $1.35 Billion, up 26 Percent Year-over-Year Net Income $1.3 Billion EPS 22 cents... Read more...
Google today announced that it has reached a settlement to acquire Postini, a company that provides clients with security services (protecting instant messaging, e-mail, and other modes of communication). The $625 million deal gives Google access to an established clientele of over 35,000 businesses and 10 million international users, and... Read more...
BlackBerrys can be quite useful for staying in touch, sending media, and even sending business related files.  People might want to draw the line at sensitive government data: "We're not at war with France, at least not the last time I checked, but that doesn't mean that the French want their state secrets coursing through the U.S. telecommunications... Read more...
If you are one of those people who already owns an Apple TV, then you might want to go into your menu and force an update.  The security patch that fixes a buffer overflow issue will not be part of automatic updates at this time. Description: A buffer overflow vulnerability exists in the UPnP IGD (Internet Gateway Device Standardized Device... Read more...
Care to guess how many computer viruses, thefts, hacker break-ins, and other security issues the Department Of Homeland Security has suffered over the past 2 years?  If you guessed over 800, you're a right! "In one instance, hacker tools for stealing passwords and other files were found on two internal Homeland Security computer systems.... Read more...
Prev 1 2 3 4 5 Next