| Old Articles: <Older 8721-8730 Newer> |
 |
InternetNews February 18, 2010 |
SANS Names Mistakes That Cause Vulnerability If programmers were perfect, there would be no vulnerabilities for the bad guys to exploit. SANS Institute has listed the most common mistakes leading to the most common exploits.  |
InternetNews February 18, 2010 |
Microsoft Blames XP Blue Screens on Rootkits Microsoft concludes that flaw that caused XP users' machines to crash owed to rootkit malware on their systems, dismissing speculation that a Microsoft patch caused the problem.  |
InternetNews February 18, 2010 |
Kneber Botnet Pierces 2,500 Organizations So-called 'Kneber' botnet collects log-in credentials to online financial systems, social networking sites and e-mail systems to break into accounts and steal corporate and government data at an astonishing pace.  |
InternetNews February 18, 2010 |
Metasploit Moving Into Commercial Mainstream What began as a standalone community project for testing exploits and fixing flaws is gaining traction in the commercial community, as more enterprises are rolling out support for Metasploit.  |
InternetNews February 18, 2010 |
Mozilla Updates Older Versions of Firefox Open source developer's new Firefox 3.5.8 and 3.0.18 updates deliver five key security fixes, three rated by Mozilla as being critical in severity, and two rated as moderate.  |
InternetNews February 18, 2010 |
Study: Users Are 'Always On' But At What Cost? New study by Osterman Research finds that ubiquitous mobile devices and access to e-mail and texting is putting users in awkward - and occasionally dangerous - situations.  |
IndustryWeek February 17, 2010 Peter Alpern |
Telematics Finding a Place in Operations Communications technology playing an increased role in monitoring process systems, says wireless communications exec.  |
IndustryWeek February 17, 2010 Peter Alpern |
NASA Tool Could Cross Over to Manufacturing HyperSizer analysis optimizes design architectures, predicts performance of composite materials.  |
InternetNews February 17, 2010 |
Juniper Tightens Up Mobile Network Security Networking vendor Juniper aims to shore up mobile security with new connection technology that battens down both ends of the network, and already has some big-name customers.  |
InternetNews February 17, 2010 |
When the Cyber Attack Comes, Will We Be Ready? War-game simulation of a massive cyber attack on U.S. infrastructure highlights emergency provisions administration officials might be forced to take.  |
| <Older 8721-8730 Newer> Return to current articles. |