- Core IT
- Business & Money
- Personal Tech
Member since: August 2012
Areas of Interest:
- A recent expose shines a light onto the strange world of "booter" or "stressor" web sites which offer DDoS-attacks-for-hire.
1 day 1 hour ago
- Cyber espionage from China is at the top of the U.S.'s grievance list. But Pentagon brass and official Washington dithered for more than a decade while attacks mounted.
1 week 4 days ago
- AV companies have been at war with the bad guys for much of the last two decades. And guess what? The bad guys won. Now that the days of antivirus software being in the front line of defense against malware are over, what companies are ready to step in and take up arms against sophisticated attacks and malware? Here are five to keep your eye on.
2 weeks 4 days ago
- As chaos reigned in the hours after twin explosions at the finish line of the storied Boston Marathon, social media outlets became a lifeline between runners, spectators and the outside world.
5 weeks 13 hours ago
- The IRS is scaring taxpayers silly this season with boasts about its Big Data prowess and 'robo audits.' But recent reports suggest the agency is struggling to keep its IT operations afloat.
5 weeks 5 days ago
- With the federal government proposing airplane style "black boxes" in every automobile, a crowd-funded project wants to design a lock that will allow car owners to secure their data from snooping and tampering.
7 weeks 1 day ago
- Microsoft's Windows operating system spent close to two decades as the 'problem child' of the IT world - ubiquitous, buggy and easy to hack. But this week brought more evidence that Google and its Android mobile operating system may be taking that mantle from the folks in Redmond, Washington.
7 weeks 6 days ago
- The U.S. military relies heavily on distributed, wireless networks to communicate in combat zones. Now DARPA is looking for ideas on how to keep enemies off these networks.
9 weeks 11 hours ago
- paulfroberts wrote PC cleanup scammer calls Microsoft Malware Protection Center expert. Hilarity ensues.What's a bad day for a scammer selling bogus Windows PC clean up services? How about accidentally dialing a guy who works in Microsoft's Malware Protection Center!
10 weeks 1 day ago
- A security researcher claims to have found five, new vulnerabilities in Oracle's Java technology that could allow a malicious hacker to bypass safety features in the latest version of the Java technology.
11 weeks 1 day ago
- A steady drumbeat of news about sophisticated cyber attacks against our government and leading institutions has attendees at this year's RSA conference in a fever. And that may be bad for security.
12 weeks 1 day ago
- As if you didn't know it already: antivirus software isn't doing its job, even though it sucks up around 30% of IT security budgets. But where can companies turn next? Two firms think they have an answer.
12 weeks 1 day ago
- paulfroberts wrote Security stories to watch: Security firm Bit9 hacked. Also: Microsoft megapatch and identity managementThe hack of security firm Bit9 reminds us that application whitelists work great at stopping malware ... until they don't. And: Microsoft prepares a mystery 'double patch' of the Internet Explorer web browser, fueling speculation.
14 weeks 1 day ago
- Last week's revelations about hacks of prominent media outlets continues. Plus: new questions about the security of encrypted communications will dominate the news this week.
15 weeks 1 day ago
- D.C. wonks warm up to a new Cold War: this one fought with computers. Plus: Death of Aaron Swartz inspires Anonymous back to action.
16 weeks 1 day ago
- Plan on hearing a lot more about the world's most famous (and audacious) Internet tycoon: Kim Dotcom this week, following the launch of his new cloud-based storage service: Mega. And: more stories about the computer security threat posed by things you didn't even know were computers.
17 weeks 1 day ago
- Forget "PC LOAD LETTER," a vulnerability in a standard component of modern office printers may make hardware from a wide range of vendors vulnerable to denial of service attacks and data theft, according to a researcher for security firm ViaForensics.
17 weeks 1 day ago
- The patches are out for both Java and Internet Explorer, but this is hardly the end of the story - or the hand wringing. Also: a SCADA-pocalypse!
18 weeks 11 hours ago
- There are a lot of reasons to be skeptical of a future in which smart devices of every shape and size do our thinking for us. Here are five good reasons the Internet of Things might just make our lives worse.
18 weeks 1 day ago
- Privacy regulations like HIPAA and GLB are mind boggling in their complexity, and that makes complying with them difficult. But what if you could automate compliance audits, harnessing heavy compute power to measure compliance with privacy laws and spot violations? Researchers from CMU may have found a way to do so.
18 weeks 4 days ago
- paulfroberts wrote 3 security things to watch: A Turkish twist, IE's quick fix, Anonymous takes action in high school assault caseLook for continued fallout from the security lapse at Turkish Certificate Authority TurkTrust this week in security. Also: pressure on Microsoft over IE flaw, and hacktivists take action in high profile high school rape case.
19 weeks 1 day ago
- For much of the past quarter century, computer crime has been a decidedly First World problem. But that's about to change, security experts say.
20 weeks 5 days ago
- A new week is upon us and, with it, new challenges. Here are some of the big security stories to watch for in the coming days.
22 weeks 1 day ago
- The onslaught of sophisticated cyber espionage against the U.S. and its allies has roused both lawmakers and private sector firms to tackle supply chain security.
23 weeks 1 day ago
- [chunklet] Would-be lovers - stop using e-mail to communicate.
26 weeks 12 hours ago
- 1 of 2
Follow other ITworld members or sign in with your Facebook account in order to view your friends' activity.