With costs related to a rogue network administrator's hijacking of the city's network now estimated at $1 million, city officials say they are searching for a mysterious networking device hidden somewhere on the network.
To make up for a string of outages that were caused by a software bug in its Azure cloud services Microsoft is granting affected customers a 33% credit for the time they were left stranded during the Feb. 29 failure.
Sxip, which develops the free single sign-on plug-in for Firefox called Sxipper, is working to revolutionize the use of address books by helping Web surfers link their contacts to information they are searching for on the Web.
Researchers from Microsoft and the Dutch Katholieke Universiteit Leuven have discovered a way to break the widely used Advanced Encryption Standard (AES), the encryption algorithm used to secure most all online transactions and wireless communications.
Taiwan Semiconductor Manufacturing (TSMC) Chairman Morris Chang predicted a long fight and ultimate victory against new contract chip rival GlobalFoundries, a joint venture between AMD and an investment fund from Abu Dhabi.
2008 is a special year for the digital security community. Twenty years have passed since the Morris Worm brought computer security to the attention of the wider public, followed by the formation of the Computer Emergency Team/Coordination Center (CERT/CC) to help organizations detect, prevent and respond to security incidents. Ten years have passed since members of the L0pht security research group told Congress they could disable the Internet in 30 minutes. Five years have passed since the SQL Slammer wo
Adobe made a critical change to the algorithm used to password-protect PDF documents in Acrobat 9, making it much easier to recover a password and raising concern over the safety of documents, according to Russian security firm Elcomsoft.
Most people think that tagging on the Web is pretty easy and fun. Give 'em a blog or a Web page and a field named "tags," and they'll start stuffing in text with wild abandon in the hopes that their content will be easily found by people who are desperately searching for information and opinion on feline hairball cures or cycling in the Ozarks or whatever their particular hobby is. Alas, all these folks are doing is polluting the Web.
RSA '07: Cisco's transformation still work in progress, 02/06/07
Cisco used the RSA Security Conference in San Francisco to trumpet its transformation from "packet pusher" to "infrastructure" company, unveiling a string of product updates that unify its diverse security portfolio on Monday.
Last week we discussed “ping” and “tracert” and how the usefulness of these commands has been diminished because they could be exploited for illegitimate purposes. We ended by talking about how “ping” could still be useful for determining IP addresses as a first level of diagnostics in some cases, for checking on the status of a Web site. Nevertheless, we only wrote about the direct use of an IP address in a URL as http://[the_IP_address] instead of substituting the string of numbers.
The massive data breach at The TJX Companies made public earlier this year -- and a string of similar smaller breaches at various other firms since then -- appears to be goading merchants to accelerate their adoption of the Payment Card Industry (PCI) data security standard.
Barack Obama's election to U.S. president has already brought a string of firsts, and on Wednesday there came another. The official presidential portrait was shot on a digital camera for the first time.
In 2001, Nippon Telegraph and Telephone, Japan's dominant telecom provider, got a shock. It had just started DSL broadband Internet service and was taking its first steps toward reaping the benefits of an ambitious and costly plan to string fiber-optic cable along every street in the country when along came Softbank.
A three-day Identity Mashup Conference took place last week hosted by the Berkman Center for Internet and Society at Harvard Law School. This was another in a long string of individual, or as it's being called "user-centric" identity meetings this year.
Is there an independent company that provides ratings of training providers – a sort of Consumer Reports of the IT training industry? That was a question that I recently received from a reader who is an IT manager with a construction company. I thought it would be an easy enough question to answer but after asking a number of training providers and a recruiter, I couldn’t pinpoint a company that provided just that. Even the reader couldn’t find anything after a couple of hours searching the Web.
The U.S. government believes it can freely search the contents of your laptop or other mobile device upon entering the United States, since it views this practice as conceptually identical to searching your luggage at the airport, which it can do without any sort of probable cause. A federal appeals court agrees with the government’s position and few judges seem to disagree with the practice. The good that comes from this practice is that child pornographers can be thwarted, but the quite serious downsid
Businesses have to facilitate sharing of data over the network, while preventing theft or unauthorized access of that data in an increasingly hostile environment. Organizations must be able to establish the identity of the remote entity with a high degree of certainty. The Initiative for Open Authentication (OATH) is developing technology to enable strong authentication of all users on all devices, across all networks, such as its algorithm for one-time passwords.
Salesforce.com is the leading on-demand CRM tool, providing all the benefits of a Web based application and a great user interface. The user interface has been based on the popular and effective Miller-Heiman sales model since 2002. However, a string of outages in December, January and again in March show that the company is struggling under the weight of its own success.
A points analysis metric developed by NBA statisticians and Lenovo engineers predicts that the Boston Celtics will beat the Los Angeles Lakers in the NBA Finals based on the statistical superior play of Boston's five top players when they have shared the court in the playoffs. The Finals started Thursday night, with Boston winning the first game, 98-88.
Cisco used the RSA Security Conference in San Francisco to trumpet its transformation from "packet pusher" to "infrastructure" company, unveiling a string of product updates that unify its diverse security portfolio on Monday.
The National Institute of Standards and Technology today announced a public competition to pick a new cryptographic hash algorithm that would become the new federal information processing standard. This evaluation process is expected to run a minimum of three years.
Line, the chat app that is exploding in popularity in Japan and other Asian countries, has published an online safety guide for teens after a string of incidents in which it was used to maliciously target young women.
Last week's rant about tracking off-site tapes kicked off a string of e-mails from several of you. John, Indiana's resident Storage Wise Guy, has dealt with this issue for years, and offers a simple guideline: