[ Technology Blogs Articles News Reviews ]

www Technoclicks.com
Post Tech Blog Article News Reviews

Top Articles

Posted by iTech on 2005-12-21       Article Source : TechWeb News

In a first, a worm has trapped a criminal rather than an innocent Internet user, a Reuters wire service report from Germany claimed Tuesday.

According to Reuters, a 20-year-old German man mistook a message bearing the Sober.z worm as a legitimate directive from German law enforcement, and turned himself in to Paderborn police. Paderborn is in northwestern Germany, about 75 miles east of Essen.

Sober.z was one of several November variants whose payload-bearing e-mail messages claimed to be from law

Read More...  
Posted by iTech on 2005-12-21   

Reporting and analytics vendor Actuate is expected to announce this week that it plans to package its analytics and reporting capabilities into technology from Quantum Secure that tracks companies' "physical" security.

Quantum Secure makes Safe Enterprise Physical Security Management, a suite that includes the mySafe Portal dashboard system, which lets users monitor security in a dashboard-like format. The Safe system also helps in the control of building access, visitor management, video surveillance and fire systems.

Actuate's reporting technology will allow

Read More...  
Posted by inet on 2005-12-19       Article Source : TechWeb News

The Dasher.b worm attacking Windows machines still vulnerable to a bug patched in October has infected at least 3,000 systems so far, security company Symantec said Friday.

Dasher.b, the first worm to successfully attack the MSDTC flaw disclosed and patched Oct. 11, was detected Thursday by honeypot PCs, with several security vendors rushing out alerts that same day.

According to Symantec, once Dasher.b has infected a PC, it first contacts a central command and control server located at IP address

Read More...  
Posted by iTech on 2005-12-17       Article Source : TechWeb News

As the U.S. Senate threatens a filibuster, dozens of groups and newspaper editorials around the nation are questioning the government's ability to electronically monitor citizens and enter personal information into databases.

At a press conference this week the Electronic Privacy Information Center joined dozens joined an FBI spokesperson, conservative groups, Veterans for Peace, Senate Republicans, localities, medical associations and others supporting Senate-proposed reforms to the law, passed shortly after Sept. 11.

The Patriot Act, which gives government the power to

Read More...  
Posted by inet on 2005-12-16       Article Source : TechWeb News

The first worm that successfully attacks an October vulnerability in Microsoft Windows was spotted in the wild Thursday, a pair of security organizations said.

Both F-Secure and the SANS Institute's Internet Storm Center (ISC) said that the worm, dubbed Dasher.b, had been nabbed by the Honeypot Project, a German group that deploys exposed PCs to attract malicious code and capture samples. The worm exploits the MSDTC vulnerability disclosed by Microsoft in its October patch batch.

In late November, Microsoft issued

Read More...  
Posted by iMark on 2005-12-16       Article Source : EE Times

Digital media processor supplier Sigma Designs has signed a definitive agreement to acquire Blue7 Communications, a developer of advanced wireless technologies and ultrawideband (UWB) semiconductors.

Sigma Designs (Milpitas, Calif.) will pay $14 million in stock considerations for Blue7 (San Jose), a private start-up company focused on developing UWB semiconductor products for consumer electronics. Products being designed include the Windeo chipset, an all-CMOS solution with the baseband and MAC integrated chip along with an RF front-end chip.

Blue7 employs 20 people, 18 of

Read More...  
Posted by iMark on 2005-12-15       Article Source : TechWeb News

Microsoft on Tuesday released two security bulletins that patched four vulnerabilities its Internet Explorer browser and one in its Windows 2000 operating system. Two of the vulnerabilities were tagged by Microsoft as "critical."

As expected, one of the four fixes for IE is a patch for the zero-day vulnerability acknowledged by Microsoft in late November.

Microsoft's first bulletin, MS050-054, fixes four separate bugs in Internet Explorer, two of them marked with Microsoft's most serious label, critical.

Those two

Read More...  
Posted by inet on 2005-12-14   

Mobile devices, Cisco routers, Oracle software, VoIP: businesses can expect all these and more to become hacker targets in the next year and beyond, according to Symantec. Oh, and don't forget Windows Vista, Microsoft's next-generation operating system. They're all places that the financially-motivated new generation of hackers might look to exploit.

Frequent Microsoft security patches, SANS Institute studies and worm attacks suggest the next generation of Windows should be prime meat, yet on this topic Symantec treads lightly. "We'll see an intense

Read More...  
Posted by inet on 2005-12-14       Article Source : TechWeb News

Port scanning, the practice of sniffing for computers with unprotected and open ports, isn't much of a harbinger of an attack, a University of Maryland researcher said Monday.

Michel Cukier, an assistant professor at the College Park, Maryland-based school, said that contrary to common thought, few port scans actually result in an attack. In fact, only about five percent of attacks are preceded by port scans alone.

"But when you combine port scans with other kinds of scans, particularly vulnerability

Read More...  
Posted by iTech on 2005-12-14       Article Source : TechWeb News

A security firm said it has cracked the Sober worm, and uncovered the URLs the long-running worm will use in January to update itself to a new variant.

Helsinki-based F-Secure is the second vendor this week to claim that it had dug up new information on the two-year-old Sober clan; on Wednesday, Reston, Va.-based iDefense said its research had confirmed the next release date of Sober as Jan. 5, 2006.

F-Secure, however, has identified the Web sites that Sober will

Read More...  
Posted by inet on 2005-12-11       Article Source : TechWeb News

A statement that cybercrime proceeds amounted to more than $105 billion in 2004, made Nov. 28 during a banking security conference in Riyadh, Saudi Arabia by U.S. Treasury advisor Valerie McNevin, is sparking push-back from experts who aren't sure it's on the mark.

McNevin's claim was reported by Reuters and widely circulated. While no one disputes that the cost of cybercrime can be devastating, several experts are questioning the profit claims.

"This is just total bunk," Richard Stiennon, VP of

Read More...  
Posted by iTech on 2005-12-11       Article Source : TechWeb News

The sharp rise in rootkits--sneaky software used to conceal malicious code from security programs--is due to spyware and adware purveyors trying to prevent their wares from being easily uninstalled, security experts said Thursday.

Finnish-based F-Secure, which has integrated its BlackLight rootkit scanner into its security suite, claimed that since October, the most common rootkit in the wild is the one used by the Apropos spyware program.

Apropos uses a silent installer to disguise its planting on the hard drive, and

Read More...  
Posted by inet on 2005-12-10       Article Source : TechWeb News

Consumers whose financial and personal information is stolen are more likely to be victimized if the data breach is small, a study of four data disclosures reported Thursday.

ID Analytics, a San Diego-based identity risk management company, analyzed four data breaches that revealed approximately half a million identities, comparing the IDs against credit card, wireless service, and instant loan applications.

The smaller the size of the breach, the higher a consumer's risk of identity theft, ID Analytics concluded. That's because

Read More...  
Posted by inet on 2005-12-09       Article Source : TechWeb News

The growing sophistication of phishers has left the majority of Americans unable to tell the difference between legitimate and scam e-mail, a survey released Wednesday showed.

Nearly a quarter of online people in the United States have found themselves the target of the online con artists, and roughly one in five knows a friend or family member who has been duped, according to the second annual survey by America Online Inc. and the National Cyber Security Alliance.

Pointing to the

Read More...  
Posted by iMark on 2005-12-06       Article Source : CRN

ERP and accounting partners targeting the midmarket with online store aspirations might want to check out Ignify's newly updated eCommerce platform.

Ignify this week added advanced heuristic antifraud features to its existing e-commerce engine, according to the Los Angeles-based vendor. "This release focuses on security for merchants who deploy online stores and B2B commerce sites. It's around encryption, advanced fraud monitoring that goes beyond basic address verification," said Sandeep Walia, president, North America, for Ignify.

"We look at heuristic patterns

Read More...  


3 4 5 6 7 8 9 10 11 12 13 14 15

[Next] [Last Page]


Jump To Page > 3 6 9 12 15

Recent Articles


Home | | Members | Search | Upadtes | RSS | Tags | Site Map | Tags | Conact

© Technoclicks.com - All rights reserved.