[ Technology Blogs Articles News Reviews ]

 
Google
www Technoclicks.com
Post Tech Blog Article News Reviews

Top Articles

Posted by iTech on 2006-03-03       Article Source : VARBusiness

A new report issued by Websense Security Labs shows that hacker attacks have evolved from random endeavors designed to create havoc to increasingly well-organized assaults with financial and criminal motives.

The lab was set up in 2004 and has been releasing semiannual reports that recap the previous six months of hacker activity and project the likely arc of future security issues. The current report covers Web activity for the second half of 2005.

In particular, the nature of phishing has begun

Read More...  
Posted by iTech on 2006-03-03       Article Source : InformationWeek

Oracle has issued a patch to its E-Business Suite diagnostics software that included a number of security fixes the company advised its customers to implement as soon as possible. The patch, called “Diagnostics Support Pack February 2006 with Oracle Diagnostics 2.3 RUP A,” addresses a troubleshooting feature in E-Business Suite 11i that lets system administrators and other users execute tests on the application's configuration and setup. Without the patch it's possible that some diagnostics tests could be accessed without logging into Oracle applications. Read More...  

Posted by inet on 2006-03-03       Article Source : TechWeb News

The Securities and Exchange Commission (SEC) Monday announced it had filed fraud charges against the owner of an Autosurf site who it accused of running a $50 million Ponzi scam and pocketing nearly $2 million herself.

Papers were filed last week in a Los Angeles federal court alleging that Charis Johnson, 33, of Charlotte, N.C., ran a Ponzi scheme using her 12dailypro.com Web site. As a result, Johnson has agreed to cease solicitation of new members, and her assets have been frozen.

Read More...  
Posted by iMark on 2006-02-24       Article Source : TechWeb News

Access Integrated Technologies Inc. (AccessIT) intends to roll out a digital cinema anti-piracy initiative focused on forensic watermarking technology, and detection and recovery services by April.

Incorporated into the platform, CineFence watermark technology licensed from Royal Philips Electronics. The strategy aims to help movie studios and other content owners fend off pirates who bring camcorders into theaters to record and redistribute movies illegally.

The Motion Picture Association of America estimates movie pirates cost Hollywood an estimated $3.5 billon annually. Read More...  

Posted by iTech on 2006-02-24       Article Source : Small Business Pipeline

Intuit Inc. today announced a simplified credit card processing software package for the many small businesses that don't have a full accounting package or an enterprise-class merchant account service.

Called the QuickBooks Credit Card Processing Kit, the software is priced at $39.95 and is designed for small businesses that handle less than $5,000 in credit card transactions per month.

The kit allows small business owners to turn their PCs into credit card terminals, and includes everything a small business needs

Read More...  
Posted by iNext on 2006-02-23       Article Source : TechWeb News

Microsoft Corp. on Tuesday criticized a security company's recent offer of $10,000 to someone who discovers a Windows flaw that leads to a critical fix, saying the program is not the best way to protect customers.

IDefense started offering the bounty last week as an addition to its controversial Vulnerability Contributor Program, launched in 2005.

SMQ-8220-SMQMicrosoft works closely with many security research and security software companies and does not believe that offering compensation for vulnerability information is the best way

Read More...  
Posted by iTech on 2006-02-22       Article Source : EE Times

KADIMA, Israel — SuperCom Ltd. has unveiled new technology for active tracking of people and assets.

The Israeli provider of smart card and electronic identification products has developed movement detection technology that can monitor and track numerous items simultaneously. The tracking technology employs small, low-powered RF tags attached to an object or a person. License-free radio bands are used to track the RF band from a programmable transmitter.

SuperCom claims its Pure RF product can monitor and locate tagged items

Read More...  
Posted by iMark on 2006-02-21       Article Source : TechWeb News

An exploit against the Windows Media Player vulnerability disclosed by Microsoft two days ago is nearly finished, a security company said Thursday, and may be only hours away from hitting unpatched users.

The bug, which was made public Tuesday in security bulletin MS06-005, allows attackers armed with malicious .bmp image files to hijack Windows PCs.

"There are two exploits circulating," said Mike Puterbaugh, the vice president of marketing at eEye Digital Security, the Aliso Viejo, Calif.-based company which first uncovered

Read More...  
Posted by iMark on 2006-02-21       Article Source : EE Times

TEL AVIV, Israel — Aladdin Knowledge Systems, the USB-based authentication provider will release a Flash version of Aladdin’s eToken system in April.

The eToken NG-FLASH combines strong authentication with a mass-storage drive for retaining encrypted data and personal information needed to access that data on the token. It will be initially introduced in three sizes: 128 and 512 MBytes and 1 Gbyte.

Aladdin also announced that it will introduce as early as 2007 a new biometric technology that provides authentication

Read More...  
Posted by iTech on 2006-02-18       Article Source : CRN

While storage giant Network Appliance enjoyed a strong third fiscal quarter, data security will be the company's next main revenue driver going forward, the company's CEO told CRN on Wednesday.

Thanks to last year's acquisition of Decru, a developer of technology to encrypt data before it is sent to tape or to off-site storage archives, security currently accounts for about 1 percent of NetApp's overall revenue today, said CEO Dan Warmenhoven.

However, he said that bookings are currently twice those

Read More...  
Posted by iMark on 2006-02-16       Article Source : TechWeb News

While Microsoft's chairman Bill Gates told security professionals that security is job number one on Tuesday, he's leaving it up to developers like those working up the next version of Internet Explorer to make it happen.

Internet Explorer 7 (IE 7), said Gary Schare, director of product management for IE, will reduce the chance that spyware spreaders can use silent drive-by downloads to infect PCs with malicious software.

"Drive-by download" is the term for the hacker practice of using vulnerabilities,

Read More...  
Posted by inet on 2006-02-16       Article Source : EE Times

MANHASSET, N.Y. — Sun Microsystems Inc. has announced that the Sun Java System Web Server 7.0 will support Elliptic Curve Cryptography (ECC), a next generation security technology selected by the National Security Agency to protect classified U. S. Government information.

According to Sun (Mountain View, Calif.), encrypting ECC in the Java System Web Server will reduce the time spent completing secure online transactions. In addition, ECC encryption increases the security of the Java System Web Server by enabling secure transactions with ECC enabled

Read More...  
Posted by iMark on 2006-02-12       Article Source : TechWeb News

Russian scammers have pillaged more than a million euros ($1.19 million) from French bank accounts in the last 11 months, news reports from the U.K. claimed Wednesday.

According to the "Guardian," a gang of Russian and Ukrainian hackers planted keylogging Trojans on French consumers' computers via infected e-mail or malicious Web sites. The keyloggers -- dubbed "sleeper bugs" by the newspaper -- only activated when users logged in to the bank accounts, at which point usernames and passwords were captured and transmitted.

Read More...  
Posted by iNext on 2006-02-10       Article Source : CRN

Oracle plans to have a somewhat integrated version of acquired identity- and access-management software available within months.

Oracle Identity Management 10g Release 3, incorporating Oblix identify management, Thor Technologies provisioning tools and OctetString's virtual directory, should be available around May, or toward the end of Oracle's fiscal year, said Amit Jasuja, vice president of Identity Management Product Development for the Redwood Shores, Calif., database giant. Oracle will discuss its plans at next week's RSA Conference.

"With this release we're updating

Read More...  
Posted by iNext on 2006-02-09   

Privacy Networks took the wraps off a new integrated e-mail management platform designed to replace multiple point solutions with a single system that combines spam and virus protection with e-mail archiving capabilities.

Privacy Networks’ Email Integrity Suite (EIS) is an integrated suite of tools developed in house and designed to manage all aspects of enterprise e-mail security and management requirements, for both the SMB market and e-mail service providers.

The company has secured industry partners, including Hewlett-Packard, and a growing

Read More...  

[Prev]

2 3 4 5 6 7 8 9 10 11 12

[Next] [Last Page]

 

Jump To Page > 3 6 9 12 15

Recent Articles



 

Home | | Members | Search | Upadtes | RSS | Tags | Site Map | Tags | Conact

© Technoclicks.com - All rights reserved.