- Welcome Guest
- Sign In
Porn, spam and jobs are among the subjects found in the latest list of proposed top-level domains (TLDs) hoping to join the ranks of .com, .net, .org and others. According to the Internet Corporation for Assigned Names and Numbers (ICANN), the governing body of the Internet, 10 groups have applied f...
A new trend in extorting money from sports and gambling Web sites isn't going away like security experts had predicted. Online gambling Web sites began receiving e-mail threats in October of last year. The messages contained demands for money to prevent distributed denial-of-service (DDoS) attacks t...
Game giant Electronic Arts is giving the University of Southern California's Interactive Media Division a multimillion-dollar donation to advance interactive media education and produce professionals for the next generation of gaming. The money -- which is part of EA's global education and talent de...
A computer worm that targets antivirus or firewall protection is nothing new, but the most recent case of a direct attack against computer defenses unfolded with alarming speed, less than two days after vulnerabilities in Internet Security Systems' BlackICE and RealSecure software were disclosed. As...
Last week I flew down to the launch of the new Starbucks music service and got far more out of the event than a cup of coffee and some free music. I got a sense of why Starbucks is as successful as it is and why HP is suddenly emerging as the company to beat in the technology space. I also went away...
Faster, more flexible, less expensive and more functional has been the telecommunications industry's mantra. As soon as one networking technology takes hold, vendors begin pushing another that promises to deliver more functionality, and such a scenario is now unfolding with wireless wide area networ...
Rounding out the last half of the alphabet with Bagle.Q, Bagle.R, Bagle.S and Bagle.T variants, the latest worms in a long string of malware have become more sophisticated and sneaky, leaving security experts to ponder what might come next from the evolving family of malicious code. Reports from ant...
A former Romanian software programmer who now works for Microsoft has filed a $25 million lawsuit against peer-to-peer (P2P) leader Sharman Networks, which owns and runs the Kazaa file-sharing utility that the man, Fabian Toader, claims is his work. Toader, who worked on a freelance basis for Kazaa ...
An unsolicited e-mail arrives in your in-box from Marc Racicot, chairman of the Bush-Cheney '04 campaign, asking you to donate "using our secure server," a total of $2,000, $1,000, or a smaller sum, to keep TV ads exposing John Kerry's miserly defense spending record on the air. Political spam, like...
Passwords are the first line of defense in almost every company's security scheme. But sometimes they are the weakest link because they can be easily guessed, stolen or otherwise compromised. If a firm wants to keep its information secure, then it needs to put additional security checks in place. Pa...
Spyware has surpassed viruses as the number one threat facing your computer today. In fact, most estimates report that 90 percent of computers already have been infiltrated by spyware, which is the name given to any program that installs itself on your hard drive, collects personal information about...
Internet civil libertarians are raising red flags over parallel bills in the California state legislature that would punish file traders of copyrighted materials with up to a year in jail, $2,500 in fines or both if the users do not provide their real names and addresses with the title of the work. ...
Some malware that packs an unusual assortment of tools for mischief and has infected thousands of computers on the Internet is being watched closely by security experts. Although the "Phatbot" or "Polybot" program currently poses a low risk to online systems, its potential for devilry prompted the U...
A router maker starts receiving complaints from customers -- around the world -- that the ports on a particular networking device are not working properly. IT professionals, scrambling to cope, attempt to close the faulty ports with technology equivalent to electrical tape. They are able to redirect...
Despite lacking a legal requirement to comply with government surveillance rules, Time Warner is reportedly among major cable operators working to follow the controversial Communications Assistance for Law Enforcement Act (CALEA), which the FBI has recently argued should apply to Web-based, Voice ov...