| Old Articles: <Older 1681-1690 Newer> |
 |
PC Magazine June 2, 2004 Sebastian Rupley |
No Attachment Needed In a disturbing turn for the worse in the virus blizzards, breeds of worms are appearing that don't require the user to open an e-mail attachment to infect a PC.  |
BusinessWeek June 21, 2004 Gene G. Marcial |
No Need To Swipe These Smart Cards Contactless Smart Cards are coming -- from Israel's On Track Innovations. Its new technology lets a microprocessor read cards without users having to swipe them through a groove. A potential big player in Homeland Security makes this a stock to watch.  |
InternetNews June 10, 2004 Ryan Naraine |
Zero-Day Exploit Targets IE Flaws Browser vulnerabilities carry an 'extremely critical' rating and is being exploited to launch adware on infected machines.  |
InternetNews June 10, 2004 Sean Michael Kerner |
Open Source CVS Flaw Sparks Use Audits After new breaches found in CVS, open source community mulls how extensively they use the online repository.  |
The Motley Fool June 10, 2004 Mark Mahorney |
IT Spending Heats Up CIOs are planning to spend more on new technologies going forward, which will benefit the outsourcing companies.  |
InternetNews June 9, 2004 Roy Mark |
Humans Still Weakest Security Link Social engineering reaching epidemic stage and undermining best laid security efforts.  |
InternetNews June 9, 2004 Ryan Naraine |
Oracle Fixes E-Business Suite Flaw US-CERT warns that attackers could exploit the vulnerability and execute arbitrary SQL statements.  |
InternetNews June 9, 2004 Sean Michael Kerner |
IT's Morale Dilemma First the economic slump, now offshoring. A Meta Group report says companies must address dissatisfied IT staffs or suffer consequences.  |
InternetNews June 8, 2004 Ryan Naraine |
MS Patches 'Moderate' Direct X Flaw Microsoft issues security fixes for a pair of 'moderate' vulnerabilities.  |
InternetNews June 7, 2004 Jeremy Jarrell |
ArcSight Counters Threats Unseen Current Subscriber Identity Module (SIM) technology provides protection against existing threats, but how do you combat something that isn't there?  |
| <Older 1681-1690 Newer> Return to current articles. |