Archive

Microsoft's monthly security update was highlighted this week by a JPEG-handling vulnerability that could allow pictures in the format to provide attackers access to targeted machines. Microsoft also announced an "important" code-execution vulnerability in a WordPerfect 5.x converter, but rated the ...

OPINION

The Real World of Online Music

By selling "product" at half price, RealNetworks has climbed into second place in the corporate music market dominated by Apple. That was Real's claim at the conclusion of its 49-cents-a-pop download offer, under which it sold three million tracks to spotlight its Harmony application that lets songs...

IMlogic today released free software to help companies fight copyright piracy, avoid lawsuits from illegal file sharing and prevent damage from viruses and worms. IM Detector Pro is designed to help corporations detect and block unmanaged instant messaging (IM), peer-to-peer (P2P) and Voice over Int...

Nokia said that it has applied for membership in the SD Card Association and has signed a licensing agreement for enabling the use of SD memory cards in its devices. According to a statement, Nokia will continue to support MultiMediaCards (MMC) that are currently widely used in Nokia's mobile device...

As students all across the United States were getting ready to head back to school, the Recording Industry Association of America (RIAA) was busy beefing up its prolonged attack on consumer fair use rights and emerging consumer technologies. In a quietly-submitted letter dated August 16, 2004, lawye...

Two new computer worms have security experts both worried and wondering. One new virus is now capable of monitoring a network to steal passwords or other information, and another virus can hijack the voice capabilities of Windows XP to announce its presence to users. Experts agreed that the network ...

For companies burdened with legacy systems they can't seem to get rid of, this could be the jackpot they've been waiting for. A Los Gatos, California, startup maintains it has perfected a program that allows software applications compiled for one processor and operating system to run on another proc...

SPECIAL REPORT

Phishing E-Mail Fraud Becoming Epidemic

One morning, you receive an e-mail notification from your bank that states it needs to update your credit card data. A fill-in-the-blanks form is attached that asks for information like your address, phone number and password, so you complete it, and hit the Send button. A week later, you are at the...

In an effort to defend its dominance in router technology, Cisco has released three new multifeature routers aimed at smaller businesses and branch offices. The new routers, known as the 1800, 2800 and 3800, represent an upgrade from Cisco's previous offerings and also highlight an emerging class of...

The semiconductor industry has become inflated with hundreds of vendors competing in a crowded marketplace. However, within 10 years, 40 percent of today's semiconductor vendors are likely to leave the industry, according to new research from Gartner. Gartner analysts have identified five trends tha...

INDUSTRY ANALYSIS

Avoiding Another Recession in Tech

We just had a back-to-school flop. There was no apparent marketing of technology products, particularly PCs. And, surprise, we now have inventory problems and companies are warning that Christmas might not materialize as a major buying event either. Given how fragile the technology recovery is -- or...

Motorola, NEC, Nokia, Siemens and Sony Ericsson today announced their cooperation in mobile broadcast services, a collaboration that started as the Open Mobile Alliance (OMA). The charter of the work is to specify the enablers needed to bring broadcast services to mobile devices and to open up the m...

Transmeta Corporation announced that the Efficeon TM8800 has achieved limited production status after passing Transmeta's quality requirements. The Efficeon TM8800 is manufactured using a 90-nanometer process technology at the Fujitsu Electronics Akiruno Advanced Technology Center near Tokyo. By usi...

As it has been suing thousands of computer users accused of illegally trading copyrighted music online with peer-to-peer (P2P) technology, the Recording Industry Association of America has also been polluting P2P networks with bogus and corrupted media files to discourage P2P use. Now the industry g...

In an expected move following his arrest and confession earlier this year, an 18-year-old German student has been indicted on computer crimes for his work writing and releasing the Sasser and Netsky worms. Sven Jaschan, who was turned in by a peer who sought a US$250,000 reward from Microsoft, was a...


Technewsworld Channels