Showing category "resources" (Show all posts)

CNET Hacker Chart : Keeping up with the hackers

Posted by CNET on Wednesday, June 22, 2011, In : Security 

The number of hacking events of late is making our heads spin at CNET. By our count, there have been more than 40 computer attacks, network intrusions, or data breaches in the last few months. And they seem to be a daily occurrence.

In previous coverage we've noted that it seems to be open hacking season, written about some of the hackers and groups who are behind the attacks and speculated on their motives, so we thought we'd provide a chronological chart listing the attacks so we could ...


Continue reading ...
 

Phishers use HTML attachments to evade browser blacklists

Posted by on Tuesday, March 22, 2011, In : Security 

To get around phishing blacklists in browsers, scammers are luring people by using HTML attachments instead of URLs, a security firm is warning.

Chrome and Firefox are good at detecting phishing sites and warning Web surfers via a browser notice when they are about to visit a site that looks dangerous. So good, in fact, that scammers are resorting to a new tactic to lure victims into their traps via e-mails--attaching HTML files that are stored locally when they are opened, according ...


Continue reading ...
 

How to avoid disaster-related Internet scams

Posted by on Tuesday, March 22, 2011, In : Security 
In every disaster scammers see an opportunity, and the crisis in Japan is no exception. Already there have been fake Red Cross e-mails circulating and there will no doubt be more scams coming.

Those e-mails appear to come from the British Red Cross. They provide some news on the earthquake and tsunami in Japan and urge people to donate to a Yahoo e-mail address on a Moneybookers account, a money transfer service that enables recipients to remain anonymous, according to App River, an e-m...


Continue reading ...
 

Geinimi Android Trojan horse discovered

Posted by vijai on Sunday, January 2, 2011, In : Security 

There has been something of a sting in the tail of the year for lovers of the Android mobile operating system, as researchers uncovered a new Trojan horse.

The Troj/Geinimi-A malware (also known as "Gemini") has been seen incorporated into repackaged versions of various applications and games, and attempts to steal data, and may contact remote URLs.

Although some media reports have portrayed Geinimi as the first ever malware for the Google Android operating system, this isn't correct. For insta...

Continue reading ...
 

Searching for free stuff online can be costly

Posted by vijai on Thursday, September 16, 2010, In : Security 
This pie chart shows the different threats that can come from 
visiting Web sites that advertise unauthorized content.

This pie chart shows the different threats that can come from visiting Web sites that advertise unauthorized content.

(Credit: McAfee)

It's common knowledge that you can catch computer viruses on porn Web sites. But did you know it's also risky to surf the Web searching for free movies or music?

A study from McAfee to be released on Tuesday finds that adding the word "free" when looking for entertainment content in search engines greatly increases the chances of landing on a site hos...


Continue reading ...
 

How secure is your e-mail password?

Posted by Elinor Mills (CNET Writer) on Thursday, September 16, 2010, In : Security 
Access to an e-mail account opens up access to all sorts of other information that could be used to steal someone's identity and drain bank accounts, open up credit cards, and even take out loans in their name.

It's not just personal information at stake in e-mail accounts. Use of weak password-reset security questions is believed to have allowed someone to access the Yahoo e-mail account of a Twitter employee last year and then use that to access the person's Google Docs account where there w...

Continue reading ...
 

Be cautious of Internet access at airports

Posted by Oyya-Info on Thursday, August 26, 2010, In : Security 

Accessing the Internet via an open Wi-Fi network is risky because you have no idea who is the hot spot provider or who is connected to it. At the airport it may seem more secure to use a terminal to check your e-mail or update your Facebook status; however, according to Symantec, these terminals might not be secure at all.

In a recent article on the company's Web site, Nick Johnston, senior software engineer of Symantec Hosted Services, wrote that at one Internet terminal at a large airport ...


Continue reading ...
 

Stuxnet Malware could hijack power plants, refineries

Posted by Oyya-Info on Tuesday, August 17, 2010, In : Security 
A worm that targets critical infrastructure companies doesn't just steal data, it leaves a back door that could be used to remotely and secretly control plant operations, a Symantec researcher said on Thursday.

The Stuxnet worm infected industrial control system companies around the world, particularly in Iran and India but also companies in the U.S. energy industry, Liam O'Murchu, manager of operations for Symantec Security Response, told CNET. He declined to say how may companies may have be...

Continue reading ...
 

VeriSign adds malware scanning to SSL services

Posted by Oyya-Info on Tuesday, July 20, 2010, In : Security 

VeriSign is adding malware scanning to its authentication services for Web site operators, the company announced on Monday.

The "VeriSign Trusted" check mark seal indicates to Web surfers that VeriSign has verified that the site represents the organization or company that it purports to be and that it is using encryption to protect communications between the site and its visitors. Now, existing and new VeriSign SSL customers will have their sites scanned daily to check for malware as ...


Continue reading ...
 

DNSSEC protocol to plant security at Net's roots

Posted by Oyya-Info on Friday, July 16, 2010, In : Security 
The secure domain name server (DNS) protocol DNSSEC guarantees the authenticity of the mechanism that converts human-friendly internet addresses to the Internet Protocol numeric address system. DNSSEC — short for Domain Name System Security Extensions — uses digital signatures to assure name servers that the DNS data they receive has not been intercepted or tampered with.

The organisation responsible for managing the assignment of IP addresses and domain names, Icann, on Thursday publishe...

Continue reading ...
 

What to do with passwords once you create them

Posted by Oyya-Info on Friday, July 16, 2010, In : Security 

Cryptography expert Bruce Schneier used to write his passwords down on a slip of paper and keep it in his wallet.

Today, he uses a free Windows password-storage tool called Password Safe that he designed five years ago and released into the open-source community. The desktop application lets users remember only one master password to access their password list.

But Schneier still recommends the paper method for people who don't have their computers with them at all times like he doe...


Continue reading ...
 

World Cup pushes Internet to new record

Posted by Oyya-Info on Monday, June 14, 2010, In : Webware 

There’s a fever running through the Internet today - World Cup Fever.

Today’s Web traffic has been classified as “Heavy” for the better part of the day, according to measurements by Akamai. At its peak, traffic for News sites globally started a steady climb about 6 am ET and peaked six hours later, at Noon ET, reaching nearly 12.1 million visitors per minute.

And even though the traffic dipped going into the afternoon, it stayed well above normal - registering some 6.5 million vpn, or ...


Continue reading ...
 

Survey: 63% don't change passwords very often

Posted by Oyya-Info on Saturday, March 27, 2010, In : Security 

Security firm Symantec on Friday released results of a survey on password management that showed 63 percent of respondents don't change their passwords very often, 45 percent use a few passwords that they alternate for all accounts, and some 10 percent don't change their passwords at all.

A not so far-fetched analogy of the password by the University of Wyoming

These are a startling numbers as, according to the survey, 44 percent of respondents said they have more than 20 accounts...


Continue reading ...
 

When malware strikes via bad ads on good sites

Posted by Oyya-Info on Tuesday, March 16, 2010, In : Security 

Matt Drudge and Michael Arrington found themselves this week in an unpleasant position when visitors to their respective Drudge Report and TechCrunch sites were targeted by malware that appeared to have come from ads.

While Drudge vehemently denied it and blamed accusers with playing politics, Arrington acknowledged on Thursday that there had been malware-laden ads on TechCrunch on Wednesday. It's unclear which ad network served up the malware and what type of malware it was, althoug...


Continue reading ...
 

Want really secure Gmail? Try GPG encryption

Posted by Oyya-Info on Thursday, January 14, 2010, In : Security 

Perhaps Google's announcement that Chinese cyber attackers went after human rights activists' Gmail accounts has made you skittish about just how private your own messages are on the Google e-mail service.

Well, if you want to take a significant step in keeping prying eyes away from your electronic correspondence, one good encryption technology that predates Google altogether is worth looking at. It's called public key encryption, and I'm sharing some instructions on how to get it working i...


Continue reading ...
 

Scammers exploit Google Doodle to spread malware

Posted by Oyya-Info on Thursday, December 17, 2009, In : Security 

This Google Doodle featuring the Esperanto flag was exploited by scammers to spread malware, according to Barracuda Networks.

(Credit: Google)

Online scammers are taking advantage of the public's interest in the Google Doodle to spread malware, a security firm warned on Tuesday.

In so-called "SEO poisoning," scammers use search engine optimization techniques to increase the distribution of malware. They create special malware-rigged Web sites or hide malware on legitimate Web sites they've...


Continue reading ...
 

Character limitations in passwords considered harmful

Posted by Oyya-Info on Thursday, December 3, 2009, In : Security 

For about the 4,000th time in the last five years, I tried to sign up for a new Web service, but it wouldn't accept my proposed password. Apparently, the site operators decided that passwords should contain only letters and numbers. Aarrrrgh! This isn't the first time I've seen this idiocy, and it won't be the last. But it should be.

Guidelines on how to construct a strong password almost uniformly recommend using a mixture of upper and lower case letters, numbers, and symbols. Tools for gene...


Continue reading ...
 

Chrome OS security: 'Sandboxing' and auto updates

Posted by Oyya-Info on Tuesday, November 24, 2009, In : Security 
With most computers threatened by attacks coming through Web applications, it's no surprise that security would be a key piece of Chrome OS, Google's browser-based operating system that stores data in the cloud.

Google showed off its new lightweight operating system designed for Netbooks and cloud computing on Thursday. As anticipated, it will rely on many of the same security features and concepts used by the Chrome browser.

"The browser is the operating system. We've expanded the browser to...


Continue reading ...
 

New Firefox 3.6 beta aims to cut crashes

Posted by oyya-Info on Thursday, November 19, 2009, In : Security 

Mozilla released a third beta of Firefox 3.6 on Wednesday, adding stability and performance features, and said it hopes to lock down the code soon for its first release candidate.

The new beta, for Windows, Mac, and Linux, includes a component directory lockdown that makes it harder for other software to meddle with the open-source browser's state by preventing that software from sidling into the same folder as the browser's own components. The result should be fewer crashes, said Mozilla's...


Continue reading ...
 

Apple plugs holes for domain spoofing, other attacks

Posted by Oyya-Info on Tuesday, November 10, 2009, In : Security 

Apple on Monday released a large security update for Mac OS X that fixes dozens of vulnerabilities and provides protection against potential attacks exploiting a weakness in the protocol used to verify that a domain is legitimate.

There are 43 specific issues addressed in the 2009-006 update, released the same day as Mac OS X v.10.6.2.

It plugs a variety of holes for the Mac OS X v10.5.8, 10.6, 10.6.1, and Mac OS X Server v10.6 and 10.6.1, many of which could lead to arbitrary code execution...


Continue reading ...
 

New Trojan encrypts files but leaves no ransom note

Posted by Oyya-Info on Tuesday, November 3, 2009, In : Security 

Symantec is warning about a new Trojan horse that encrypts files on compromised computers but offers no ransom note like other software designed to hold data hostage for a fee.

Instead, a Web search for terms related to the Trojan horse leads to a company offering a way to remove the malware. The company offering the product used to charge for it but now offers it for free.

Trojan.Ramvicrype uses the RC4 algorithm to encrypt files on systems running Windows 98, 95, XP, Windows Me, Vista, N...


Continue reading ...
 

More security breaches hit midsize companies

Posted by Oyya-Info on Thursday, October 29, 2009, In : Security 

More midsize companies are being attacked by cybercriminals at the same time they're spending less on security, says a McAfee report released Wednesday.

Across the world, more than half of the 900 midsize businesses (51 to 1,000 employees) surveyed by McAfee for its report, The Security Paradox, said they've seen an increase in security breaches over the past year. Despite the threat, the recession has caused most of these companies to freeze their IT security budgets.

Midsize organizations have seen an increase in cyberthreats in 2009. (Credit: McAfee)

M...


Continue reading ...
 

Bank Trojan botnet targets Facebook users

Posted by Oyya-Info on Thursday, October 29, 2009, In : Security 

On the heels of one fake Facebook e-mail scam, a researcher warned on Wednesday of another such campaign in which users of the popular social network are being tricked into revealing their passwords and downloading a Trojan that steals financial data.

In the latest scam being blasted to e-mail in-boxes, a legitimate-looking Facebook notice asks people to provide information to help the social network update its log-in system, said Fred Touchette, a senior security analyst at AppRiver. When...


Continue reading ...
 

Adobe demos next-gen erase tool in Photoshop

Posted by Oyya-Info on Wednesday, October 21, 2009, In : Reviews 
The content fill tool can replace a complicated background when objects are erased. This example shows the removal of a U-shaped white hair.

The content fill tool can replace a complicated background when objects are erased. This example shows the removal of a U-shaped white hair.

t looks as if Photoshop, already famous for its ability to make people look thinner and skies look bluer, could take digital erasure of unsightly objects to an entirely new level.

A feature called "content-aware fill" described in an Adobe video published Tuesday shows the technology used to remove buffalo, telephone wires, and a tree from various image...


Continue reading ...
 

Mozilla pushes for fast move to Firefox 3.6

Posted by Oyya-Info on Wednesday, October 21, 2009, In : TechNews 

Mozilla hopes to classify the upcoming Firefox 3.6 as a minor update, a move that may sound inconsequential but that in fact might have significant repercussions with Firefox users and the speed the open-source browser is developed.

Mike Beltzner, Mozilla's director of Firefox, in a mailing list discussion that he'd like to call the new version a minor release "to quickly migrate our user base to Firefox 3.6." Minor releases in the past typically have been steps from, for example, 3.5.3 to ...


Continue reading ...
 

Adobe exploit puts backdoor on computers

Posted by Oyya-Info on Sunday, October 11, 2009, In : Security 

A new zero-day exploit targeting Adobe Reader, as well as 9.1.3 and earlier versions of Adobe Systems' Acrobat, drops a backdoor onto computers using JavaScript, Trend Micro researchers warned on Friday.

Trend Micro identified the exploit as a Trojan horse dubbed "Troj_Pidief.Uo" in a blog post. It arrives as a PDF file containing JavaScript-based malware, "Js_Agent.Dt," and then drops a backdoor called "Bkdr_Protux.Bd."

The exploit affects Microsoft Windows 98, ME, NT, 2000, XP, and Serv...


Continue reading ...
 

Comcast pop-ups alert customers to PC infections

Posted by Oyya-Info on Friday, October 9, 2009, In : Security 

Comcast is launching a trial on Thursday of a new automated service that will warn broadband customers of possible virus infections, if the computers are behaving as if they have been compromised by malware.

For instance, a significant overnight spike in traffic being sent from a particular Internet Protocol address could signal that a computer is infected with a virus taking control of the system and using it to send spam as part of a botnet.

Comcast is launching a trial of a service that...


Continue reading ...
 

Verizon, McAfee team up on security products

Posted by Oyya-Info on Thursday, October 8, 2009, In : Security 
With security and cloud-computing both hot-button topics, Verizon Communications and McAfee are joining forces to offer customers a combination of the two.

Verizon's business unit and McAfee announced Thursday a new joint venture to sell cloud-based security products and services to large businesses and government agencies. With more companies tapping into the "cloud" to lower costs and outsource administration, McAfee and Verizon will sell a new suite of cloud-based security products, expandi...

Continue reading ...
 

Banking Trojan steals money from under your nose

Posted by Oyya-Info on Wednesday, September 30, 2009, In : Security 

Researchers at security firm Finjan have discovered details of a new type of banking Trojan horse that doesn't just steal your bank log-in credentials but actually steals money from your account while you are logged in and displays a fake balance.

The bank Trojan, dubbed URLZone, has features designed to thwart fraud detection systems which are triggered by unusual transactions, Yuval Ben-Itzhak, chief technology officer at Finjan, said in an interview Tuesday. For instance, the software is...


Continue reading ...
 

Malware worldwide grows 15 percent in September

Posted by Oyya-Info on Tuesday, September 29, 2009, In : Security 

A rise in malware has caused the number of infected PCs worldwide to increase 15 percent just from August to September, says a report released Tuesday from antivirus vendor Panda Security.

Across the globe, the average number of PCs hit by malware now stands around 59 percent, an all-time high for the year. Among 29 countries tracked, the U.S. ranked ninth with slightly more than 58 percent of its PCs infected. Taiwan hit first place with an infection ratio of 69 percent, while Norway came i...


Continue reading ...
 

Microsoft WebsiteSpark: Tries to hit open source

Posted by Oyya-Info on Friday, September 25, 2009, In : Microsoft 

Arguably Microsoft's biggest threat is its irrelevance to Web developers. Though the company dominates personal computing and is a major force in enterprise computing, it remains a distant also-ran to LAMP (Linux, Apache, MySQL, PHP/Python/Perl) development for the growing Web ecosystem. On Thursday Microsoft announced its WebsiteSpark program to build inroads with the Web crowd, but the program is unlikely to make a serious dent on LAMP's dominance.

The reason? There are some big strings att...


Continue reading ...
 

Why virus writers are turning to open source

Posted by Oyya-Info on Saturday, September 19, 2009, In : Security 

Malware developers are going open source in an effort to make their malicious software more useful to fraudsters.

By giving criminal coders free access to malware that steals financial and personal details, the malicious software developers are hoping to expand the capabilities of old Trojans.

According to Candid W?est, threat researcher with security firm Symantec, around 10 percent of the Trojan market is now open source.

The move to an open source business model is allowing criminals t...


Continue reading ...
 

Want to analyze big data? Check your log files

Posted by Oyya-Info on Thursday, September 17, 2009, In : TechNews 

More than a few technology sectors seem to be turning up the volume on "big data" and the enormous challenges and opportunities that enterprises face in managing and analyzing their data and system resources.

There are a number of hip technologies and frameworks like Apache Hadoop, which is used to store, process, and analyze massive data sets, enabling applications to work with thousands of nodes and petabytes of data.

One area that provides never-ending data analysis fodder are log files...


Continue reading ...
 

FluidHTML seeks to bridge Web programming divide

Posted by Oyya-Info on Tuesday, September 15, 2009, In : Webware 
Today's Web programmers face a big choice when it comes to fancier aspects of their sites: HTML or Flash? One start-up hopes it can bridge the gap with a technology called FluidHTML.

The start-up, FHTML, announced software Monday at the TechCrunch50 conference that's intended to give HTML-style programmers the ability to use Flash features.

FluidHTML's language is an extension of HTML, the company said. "We borrow a lot of the really good ideas from HTML, because why wouldn't we?" said Chief...


Continue reading ...
 

SANS report: IT Security defenses misdirected

Posted by Oyya-Info on Tuesday, September 15, 2009, In : Security 

Organizations are finding it difficult to prioritize defense strategies against cyberattacks because most of them do not have an Internet-wide view of the attacks, according to a report from SANS Institute, the security training organization.

As a result, two security risks--Web applications and phishing--carry the greatest potential for damage, even though users instead tend to concentrate on less-critical risks.

The report, published by security training organization SANS Institute, amalg...


Continue reading ...
 

Microsoft launches new 'Visual Search' for Bing

Posted by Oyya-Info on Monday, September 14, 2009, In : Microsoft 
Microsoft is rolling out a new feature in its search engine Bing called Visual Search.

The new feature shows you pretty Silverlight-powered fly-in thumbnail images for only 50 specific search results (it will be expanded in the future), such as "Digital cameras," "New cars," "MLB players," and "Top songs." As you refine a query from one of the 50 visual searches available, thumbnails that don't match your query anymore fly off screen, and the rest reshuffle to fill in the blank spaces.

In a...


Continue reading ...
 

Symantec tool calculates your data's value to thieves

Posted by Oyya-Info on Thursday, September 10, 2009, In : Security 

It's no secret that criminals are stealing credit card and bank account data and selling it underground. But most people would find it shocking to learn just how little their sensitive personal information costs.

Symantec on Thursday is launching its Norton Online Risk Calculator, a tool that people can use to see how much their online information is worth on the black market. The tool also offers a risk rating based on demographics, online activity, and estimated value of online informatio...


Continue reading ...
 

Chrome extensions arriving in developer version

Posted by Oyya-Info on Thursday, September 10, 2009, In : Google 

Support for extensions to customize Chrome, the top-requested feature for Google's browser, has begun arriving for adventurous users.

Previously, extensions worked only for those who enabled the feature with a command line switch. Now the feature is enabled by default in the developer preview version of Chrome on Windows, Aaron Boodman, the Google engineer who oversees the extensions work, said in a blog post Wednesday.

"We're ready for a few more people to start using extensions--the kind ...


Continue reading ...
 

Google Voice and Gmail are sort of merging

Posted by Oyya-Info on Thursday, September 10, 2009, In : Google 

Two new little Google Voice features just made their way into Gmail. A new option lets text messages sent to Google Voice show up as e-mail messages in Gmail. You can reply to messages from Gmail, too, which makes it a nice platform for carrying on a text message conversation.

Google Voice text messages can now be read and replied to from within Gmail.

Also, there's a new Labs feature in Gmail that lets you play your Google Voice voicemail messages from inside the Gmail viewer. Previously,...


Continue reading ...
 

Microsoft: Windows 7 not affected by latest flaw

Posted by Oyya-Info on Wednesday, September 9, 2009, In : Microsoft 

Microsoft issued a formal security advisory late Tuesday on a reported zero-day flaw in Windows Vista and Windows Server 2008. However, the software maker also said that the flaw does not affect the final version of Windows 7, contrary to earlier reports.

"Microsoft is investigating new public reports of a possible vulnerability in Microsoft Server Message Block (SMB) implementation," Microsoft said in the advisory. "We are not aware of attacks that try to use the reported vulnerabilities o...


Continue reading ...
 

IBM is its own open-source lab for social software

Posted by Oyya-Info on Saturday, September 5, 2009, In : TechNews 

Most vendors must guess what customers want to buy, and how they'll use it. For IBM, however, with about 400,000 employees, it has the potential to be its own best laboratory, one that becomes even more potent when mixed with active participation in open-source communities.

That potential, as I discovered in an interview on Friday with Jeff Schick, IBM's vice president of social software, isn't a "gimme," but is powerful if you can enable the right sort of corporate culture and processes.

F...


Continue reading ...
 

Gmail outage blamed on capacity miscalculation

Posted by Oyya-Info on Wednesday, September 2, 2009, In : Google 
Google's nearly two-hour Gmail outage Tuesday was the result of a miscalculation regarding the capacity of its system, the company said late Tuesday.

Gmail was down from about 12:30 p.m. PDT Tuesday to about 2:30 p.m. PDT, affecting millions of Gmail customers who depend on the service for everything from fantasy football roster updates to business-critical information. The problem was caused by a classic cascade in which servers became overwhelmed with traffic in rapid succession.

According ...


Continue reading ...
 

Microsoft: Windows 7 can offer better battery life

Posted by Oyya-Info on Tuesday, September 1, 2009, In : Microsoft 
Ruston Panabaker, Microsoft's principal program manager of strategic silicon partnering, shows how later builds of Windows 7 were able to let the processor enter low-power states for longer periods of time, saving more power.

Ruston Panabaker, Microsoft's principal program manager of strategic silicon partnering, shows how later builds of Windows 7 were able to let the processor enter low-power states for longer periods of time, saving more power.

Upgrading a newer machine from Windows Vista to Windows 7 might mean that you get to see the last few minutes of that DVD on a long flight.

At a demo on Tuesday, Microsoft showed two identical laptops playing the same DVD, with the Windows 7-equipped notebook getting ...


Continue reading ...
 

Trend Micro launches new security tracking tool

Posted by Oyya-Info on Monday, August 31, 2009, In : Security 

It used to be that an IT administrator could warn employees about opening attachments from unknown sources or clicking on links from unknown e-mail senders as the first line of defense against spam, malware, and other bad stuff on the Internet.

Today, the seedy side of the Internet comes in many different forms and from many different sources. Stop for a moment and think about the new places where malware might be buried, hidden, released, and shared--a legitimate site that's been hacked, a b...


Continue reading ...
 

Google adds translation program to Google Docs

Posted by Oyya-Info on Thursday, August 27, 2009, In : Google 

Google continues to move language translation into more and more of its products. On Thursday, it became a feature of Google Docs, letting anyone do an on-the-spot translation into one of 42 languages.

The new feature, tucked away in a settings menu, has the smarts to automatically detect in which language the original document is written. It then opens the translated version in a new window, allowing you to compare and contrast the two side by side, more easily checking whether the translati...


Continue reading ...
 

Symantec pulls Norton patch after error reports

Posted by Oyya-Info on Thursday, August 27, 2009, In : Security 

This is the error message on the Norton support Web site after users reported that the patch failed to install properly.

(Credit: Symantec)

Symantec is providing a fix for customers who got error messages after a patch deployment went awry for some Norton users, the company said on Tuesday.

The problem started last Wednesday when Symantec deployed patches for Norton AntiVirus 2009, Norton Internet Security 2009, and Norton 360 v3 via LiveUpdate. Some customers received error messages saying th...


Continue reading ...
 

Cisco wireless LANs at risk of attack, 'skyjacking'

Posted by Oyya-Info on Tuesday, August 25, 2009, In : Security 

Cisco Systems wireless local area network equipment used by many corporations around the world is at risk of being used in denial-of-service attacks and data theft, according to a company that offers protection for WLANs.

Researchers at AirMagnet, which makes intrusion-detection systems for WLANs, discovered the vulnerability, which affects all lightweight Cisco wireless access points, as well as the exploit that could be used against networks that have the Over-the-Air-Provisioning (OTAP) ...


Continue reading ...
 

Intel, Microsoft event to highlight Windows 7 improvements

Posted by Oyya-Info on Monday, August 24, 2009, In : Microsoft 
Intel and Microsoft will hold an event next week to discuss collaboration on improvements to Windows 7.

The event, on September 1 in San Francisco, will "share how the two companies collaborated on key enhancements during the development of Windows 7," according to Intel. Steve Smith, vice president and director, Intel's Digital Enterprise Group Operations, and Michael Angiulo, general manager of Windows Planning and PC Ecosystem at Microsoft, will talk at the event. Microsoft plans to launch ...


Continue reading ...
 

Survey: Linux users love Google, ignore Bing

Posted by Oyya-Info on Saturday, August 22, 2009, In : Reviews 

Linux users are known for being a somewhat finicky lot. Despite broader application support for Windows and a better user experience in Mac OS X, Linux "desktop" users swear by the open-source operating system (and sometimes swear at its competitors).

It's therefore somewhat telling that Linux users overwhelmingly choose Google as their preferred search engine, according to data released today by Chitika, an online advertising network. Chitika analyzed data from 163 million searches across it...


Continue reading ...
 

Google's 64-bit Chrome starts emerging--on Linux

Posted by Oyya-Info on Thursday, August 20, 2009, In : Google 

Google has begun work on a 64-bit version of Chrome for Linux, a move likely to whip Linux loyalists into a lather of excitement.

"The V8 team did some amazing work this quarter building a working 64-bit port. After a handful of changes on the Chromium side, I've had Chromium Linux building on 64-bit for the last few weeks," said Chrome engineer Dean McNamee in a mailing list message Thursday

V8 is Chrome's engine for running programs written in the JavaScript language common on the Web. Chr...


Continue reading ...
 

Google Apps Script gets green light

Posted by Oyya-Info on Thursday, August 20, 2009, In : Business Tech 
Google Apps Script handles spreadsheet data.

Google Apps Script automates processes such as sending e-mails regarding spreadsheet data.

(Credit: Google Enterprise Blog)

Google officially rolled out its Apps Script functionality for enterprise users Wednesday, following a limited pilot release earlier this year.

Google Apps Script works mainly within the Spreadsheets app to automate various processes. For example, users can automate the sending of e-mails based on data held in a spreadsheet, or create scripts that communicate with other W...


Continue reading ...
 

Microsoft releases SQL Azure Database preview

Posted by Oyya-Info on Wednesday, August 19, 2009, In : Microsoft 

Microsoft has released a free trial of its cloud-based relational database.

The community technology preview (CTP) of SQL Azure Database was made available Tuesday, along with a preview of an SQL Server driver for building PHP applications for the Azure platform.

The Azure Services Platform, first announced at a developer conference last year, is Microsoft's move into the rapidly growing cloud-computing market. As with all cloud platforms, the idea is to provide scalable, hosted services o...


Continue reading ...
 

Google Chrome gets bookmark sync with version 4.x

Posted by Oyya-Info on Tuesday, August 18, 2009, In : Business Tech 
Google has issued the first developer preview version of its Chrome browser to reach the version 4.x milestone, a phase that should bring some advanced features in the forthcoming HTML 5 specification for Web pages but that for now just sports a cloud-based bookmark synchronization tool.

"Once you set up sync from the Tools menu, Chrome will then upload and store your bookmarks in your Google Account. Anytime you add or change a bookmark, your changes will be sent to the cloud and immediately...


Continue reading ...
 

How to make strong, easy-to-remember passwords

Posted by Oyya-Info on Friday, August 14, 2009, In : Security 

One of the best ways to protect your online security is to have strong passwords that you change periodically. But that's easier said than done. Coming up with hard-to-guess passwords is hard enough, but it's even harder to have separate passwords for different sites and to remember new ones after you change them.

One way to create a password that's hard to guess but easy to remember is to make up a phrase. You could type in the entire phrase (some sites let you use spaces, others don't) or y...


Continue reading ...
 

Oracle launches tool for virtual appliances

Posted by Oyya-Info on Thursday, August 13, 2009, In : Business Tech 

Oracle has released new tools for building virtual appliances, the software maker's first significant move in server virtualization since its purchase of Virtual Iron.

Oracle VM Template Builder, announced on Wednesday, is a graphical tool intended to help third-party developers and enterprise in-house teams create virtual appliances. The open-source product allows users to combine a JeOS (Just enough operating system) image of Oracle Enterprise Linux with applications and other software ins...


Continue reading ...
 

Study: Recession puts extra pressure on IT execs

Posted by Oyya-Info on Wednesday, August 12, 2009, In : Business Tech 

The recession has forced IT executives to cut costs while trying to bring in quicker returns on investment, according to a study released Wednesday by AT&T.

For its "Road to Growth" study, AT&T spoke with 77 key IT executives from large global companies. Sixty-four percent said they're under pressure to focus on projects that bring in return on investment in half or less than half the time than in the past. As a result, two-thirds said this pressure has affected their IT budgets, strategies,...


Continue reading ...
 

Microsoft releases preview for next SQL Server

Posted by Oyya-Info on Wednesday, August 12, 2009, In : Microsoft 

Microsoft has delivered the next iteration of its flagship database product, SQL Server 2008 R2, to developers for review.

The company released a preview of the software to MSDN and TechNet subscribers on Monday. A community technology preview (CTP) will be available on Wednesday for general download, Microsoft said in a blog post.

SQL Server 2008 R2, previously code-named "Kilimanjaro," is the next generation of the Microsoft SQL Server database platform. The product is planned for release ...


Continue reading ...
 

Will Google Chrome's speed displace Firefox?

Posted by Oyya-Info on Tuesday, August 11, 2009, In : Reviews 
If "only the paranoid survive," as former Intel CEO Andy Grove used to say, then Mozilla, the organization behind the open-source Firefox browser, needs to put its paranoia on overdrive.

That's the sense I got reading through Redmonk analyst Stephen O'Grady's billet-doux to Chromium, the open-source project behind the Google Chrome browser. O'Grady has long been friendly to Mozilla and a dedicated user of Firefox. When his head is turned by another browser, it's time for concern.

Yes, Firefox...


Continue reading ...
 

Windows 7: 64-bit to go prime time

Posted by Oyya-Info on Monday, August 10, 2009, In : Microsoft 

Windows 7 64-bit will soon take over desktop computers.

Consumers have had the option of 64-bit Windows computing since the release of Windows XP Professional x64 Edition in May 2005, four years after the release of Windows XP 32-bit. At the end of 2006, Windows Vista 32-bit and 64-bit versions were released simultaneously. Yet chances are you're currently using a machine that runs the 32-bit version of Windows.

This is about to change. Windows 64-bit has started to gain a significant footho...


Continue reading ...
 

Microsoft joins HTML 5 standard fray in earnest

Posted by Oyya-Info on Saturday, August 8, 2009, In : Business Tech 

After leaving much of the matter of creating a new version of HTML to Apple, Google, Opera, and Mozilla, Microsoft has begun sinking its teeth into the Web standard.

The move adds clout to the effort to renovate HyperText Markup Language, the standard used to describe Web pages, which last was formally updated in 1999. In a mailing list posting on Friday, the software giant offered a host of questions and concerns with the present proposal.

"As part of our planning for future work, the IE t...


Continue reading ...
 

FAQ: The ins and outs of DoS attacks

Posted by Oyya-Info on Friday, August 7, 2009, In : Security 

Thursday's denial-of-service attack that knocked Twitter offline for a few hours and affected Facebook, LiveJournal, and Google Sites and Blogger wasn't your average attack.

Typically, someone who has a bone to pick with a specific Web site will round up some hijacked PCs and use them to try to shut the site down. In this case, whoever was responsible was trying to block access to a specific user's accounts and not the sites themselves.

Denial-of-service attacks aren't always straight forwa...


Continue reading ...
 

Symantec Phishing Report - Attacks rose 52 percent

Posted by Oyya-Info on Thursday, August 6, 2009, In : Security 

Phishing attacks rose 52 percent in July while spam as a percentage of all e-mail stayed about the same compared with the previous month, according to the latest reports from Symantec that tracked spam and phishing activity for the month.

The State of Spam (PDF) and State of Phishing (PDF) reports were released Thursday.

With some fluctuations, spam averaged around 89 percent of all e-mail in July, noted Symantec. That compares with about 90 percent for the month of June. There are dist...


Continue reading ...
 

New Chrome beta reflects bigger Google challenge

Posted by Oyya-Info on Thursday, August 6, 2009, In : Google 

Features that Google brought to its developer preview version of Chrome--themes, a revamped new-tab page, a tweaked Omnibox for searching and entering Web addresses, and support for HTML 5 video--have now arrived on the browser's better tested beta version intended for broader use.

Individually, these features in Chrome 3.0.195.4 (download) are niceties. Collectively, they show Google is steadily moving ahead with its browser project, which was ambitious even before Chrome OS arrived on the...


Continue reading ...
 

Google to Acquire On2 Technologies

Posted by Oyya-Info on Thursday, August 6, 2009, In : Business Tech 
Google and On2 Technologies jointly announced today that they have entered into a definitive agreement under which Google will acquire On2, a developer of video compression technology. The acquisition is expected to close later this year. On2 markets video compression technologies that power high-quality video in both desktop and mobile applications and devices and also holds a number of interesting patents.

Some of its codec designs are known as VP3, VP4, VP5, TrueMotion VP6, TrueMotion VP7...


Continue reading ...
 

Chrome gives Google bookmark sync religion again

Posted by Oyya-Info on Tuesday, August 4, 2009, In : Webware 

Google ditched its browser sync plug-in for Firefox a year ago, but the idea is resurfacing in Chrome in a way that makes me think of possibilities the technology could hold for Chrome OS.

The company is preparing to build a system to synchronize bookmarks across different versions of Chrome, Google's Tim Steele said in a mailing list posting on Friday. Google envisions extending the feature to other data types, including passwords, Steele and fellow programmer Idan Avraham said in a follow...


Continue reading ...
 

Twitter warms up malware filter

Posted by Oyya-Info on Tuesday, August 4, 2009, In : Webware 

Twitter's new malware filter is a sign the social media site is stepping up efforts to stem attacks, but the measure has its shortcomings, say security experts.

Twitter's filtering mechanism was highlighted by Mikko Hypponen, chief research officer of F-Secure, in a blog post Monday. When a user tries to submit a tweet with a suspect Web link, the following warning appears:

"Oops! Your tweet contained a URL to a known malware site!"

Twitter's latest security measure was a positive one, es...


Continue reading ...
 

Windows 7, new laptop designs to converge

Posted by Oyya-Info on Sunday, August 2, 2009, In : Microsoft 
A rip-out-the-carpet PC refresh of both software and hardware is in the offing as Microsoft's latest operating system and new laptop designs converge later this year.

At the Intel Technology Summit in San Francisco on Wednesday, an executive described the imminent mobile future, including a major refresh of Netbook silicon, better-designed "ultrathins," and turbo-powered high-end laptops.

Netbooks may undergo the biggest change. Models that appear after Windows 7 ships in October will see the...


Continue reading ...
 

Microsoft: No browserless Windows 7 after all

Posted by Oyya-Info on Saturday, August 1, 2009, In : Microsoft 

Microsoft's proposed "ballot screen" that would let users in Europe choose which browser they want on their PC.

(Credit: Microsoft)

It looks like there won't be a browserless version of Windows 7, after all.

Microsoft said late Friday that it won't ship the Windows 7 "E" version of Windows even though Europe has yet to sign off on its revised plan. The plan calls for the company to ship Windows 7 with Internet Explorer, but present a ballot screen in which users in Europe can decide whether ...


Continue reading ...
 

CentOS Linux developers threaten mutiny

Posted by Oyya-Info on Thursday, July 30, 2009, In : Business Tech 

Offering a free clone of Red Hat Enterprise Linux turned out not to be such a simple matter after all.

The CentOS project aims to reproduce Red Hat's tested, supported, and certified version of the operating system, without its per-server subscription fees. Because RHEL is open-source software, it's theoretically possible for an outsider to select the same software packages, apply the same patches, and produce a version of the Linux product that works the same.

But several lead programmers...


Continue reading ...
 

Researchers exploit flaws in SSL and domain authentication system

Posted by Oyya-Info on Thursday, July 30, 2009, In : Security 
Two researchers have separately uncovered flaws in the way domain names are verified on the Internet that could allow attackers to impersonate a site and steal information from unsuspecting Web surfers.

Dan Kaminsky, who discovered a serious flaw in the Domain Name System (DNS) last year, and Moxie Marlinspike gave presentations at the Black Hat security conference on Wednesday about how someone could acquire certificates for domains they don't own and thus trick people into visiting those i...


Continue reading ...
 

Super Search brings search overkill to Firefox

Posted by Oyya-Info on Tuesday, July 28, 2009, In : Microsoft 

If you're the type of person who uses a lot of search engines and doesn't mind having a toolbar installed, you might want to check out Firefox Super Search. This Firefox-only add-on puts the power of 160 search engines in one toolbar, with about 70 that can be searched right from the toolbar itself.

If you're used to Firefox's built-in search box, this is a pretty big step up both from selecting one engine at a time and having to add additional engine tools from Mozilla's catalog. It's also...


Continue reading ...
 

Windows 7: A great gaming platform?

Posted by Oyya-Info on Monday, July 27, 2009, In : Reviews 
With the release of Windows 7 in October, PC gamers will finally have another platform on which to play their favorite games. Those who didn't quite enjoy Windows Vista as a game platform or have stuck with Windows XP are probably looking forward to the opportunity to buy some new hardware, install Windows 7, and get the most out of their favorite games.

But is Windows 7 a promising gaming platform? Now that its development is over, it's time to ask questions. What kind of gaming experience w...


Continue reading ...
 

From iPhones to smart grids at Black Hat, Defcon

Posted by Oyya-Info on Monday, July 27, 2009, In : Security 

My favorite security show each year is one at which there are no sales pitches, the speakers favor black T-shirts and dyed hair over suits and ties, and the talks tend to be controversial enough to prompt legal threats and even arrests.

I'm talking about Defcon, which starts Thursday and runs through Sunday. The event turns part of the Las Vegas strip into a geek equivalent of "Animal House" for a three-day weekend every summer.

Started in 1993 by Jeff Moss, aka Dark Tangent, Defcon bring...


Continue reading ...
 

Windows 7 will give boost to PC hardware

Posted by Oyya-Info on Sunday, July 26, 2009, In : Microsoft 

Windows 7 will be more than just a better interface. Under-the-hood changes will allow chips from Intel, Nvidia, and Advanced Micro Devices to ratchet up Windows 7 performance above previous Microsoft operating systems.

Microsoft on Wednesday said it has finalized the code for Windows 7, set to ship with new PCs starting October 22. Improvements will include how Windows handles multitasking, graphics acceleration, and solid-state drives.

Microsoft is working closely with Intel, whose chips w...


Continue reading ...
 

HP researchers develop browser-based darknet

Posted by Oyya-Info on Sunday, July 26, 2009, In : Security 

Two researchers for Hewlett-Packard have created a browser-based darknet, an idea that could make it easier for businesses to keep eavesdroppers from uncovering confidential information.

Darknets are encrypted peer-to-peer networks normally used to communicate files between closed groups of people. Most darknets require a certain level of technological literacy to set up and maintain, including taking care of the necessary servers. However, HP researchers Billy Hoffman and Matt Wood plan nex...


Continue reading ...
 

Google building 3D hardware boost into Chrome

Posted by Oyya-Info on Thursday, July 23, 2009, In : Google 
Departing significantly from what other browsers offer, Google has begun building its O3D plug-in for hardware-accelerated 3D graphics into its Chrome browser.

"The O3D team is working on getting O3D integrated into the Chromium build, and we're close to being able to complete our first step towards integration," said programmer Greg Spencer in a mailing list announcement Wednesday about Chromium, the open-source project that underlies Chrome itself. "I'll be making the Windows build of Ch...


Continue reading ...
 

Researchers to offer tool to break into Oracle databases at hacker show

Posted by Oyya-Info on Thursday, July 23, 2009, In : Security 

Security experts will be releasing a tool that can be used to break into Oracle databases during their presentation at the Black Hat and Defcon hacker conferences next week in Las Vegas.

Chris Gates and Mario Ceballos will present Oracle Pentesting Methodology and give out "all the tools to break the 'unbreakable' Oracle as Metasploit auxiliary modules," according to the summary of their presentation on the Defcon Web site.

Gates is a member of the Metasploit project, an open-sour...


Continue reading ...
 

Thunderbird 3's latest beta out now

Posted by Oyya-Info on Thursday, July 23, 2009, In : Reviews 

Thunderbird 3 beta 3 is now available to download for Windows, Mac, and Linux users. The beta introduces some significant improvements to the open-source desktop client, from performance to interface.

The new beta is built on Mozilla's Gecko 1.9.1.1 platform, keeping it up to date with the latest changes that affect Firefox. Mozilla also claims that there are more than 500 changes in this version, and hints at more alterations to come by stating in a press release that many of them are ''la...


Continue reading ...
 

Chrome security in limelight with Google OS plan

Posted by Oyya-Info on Wednesday, July 22, 2009, In : Security 

The techniques Google uses to protect Chrome users from browser-based attacks have taken on new importance with the company's plan to make the software the centerpiece of a Netbook operating system.

Two weeks ago, Google announced plans for the open-source Chrome OS designed for people who spend most of their time on the Web. The Google Chrome operating system is a "natural extension" of the Chrome browser, Sundar Pichai, vice president of product management, and Linus Upson, engineering d...


Continue reading ...
 

Changes to Google Docs hint at GDrive release

Posted by Oyya-Info on Wednesday, July 22, 2009, In : Google 

The sharp eyes over at the Google Operating System blog noticed that Google quietly changed some wording in Google Docs from "PDFs" to "files." While small, this could signal that Google Docs may soon support the viewing and editing of other file types, and possibly double as an online storage service--like the fabled GDrive.

Google has long-allowed users to upload PDFs to Docs. These could be viewed in Google's online viewer, but not edited. However, the service would not allow other items ...


Continue reading ...
 

Yahoo launching front page open to others' content

Posted by Oyya-Info on Tuesday, July 21, 2009, In : TechNews 

A significant redesign is finally coming to the Yahoo.com home page, one of the most well-traveled destinations on the Internet, and the company's search page will follow suit starting next month.

Yahoo plans to let people in the United States start selecting a new, more personalized version of the home page beginning Tuesday afternoon. The revamp lets people select basic applications to use not just Yahoo sites, but also others' such as eBay, Facebook, and Twitter, said Tapan Bhat, Yahoo's ...


Continue reading ...
 

Understanding Microsoft's Linux code shocker

Posted by Oyya-Info on Tuesday, July 21, 2009, In : Microsoft 

Microsoft dropped a mini-bombshell on Monday, announcing that it is contributing thousands of lines of code for inclusion in Linux.

But lest anyone think Microsoft suffered a massive head trauma over the weekend, the code it is releasing isn't really about helping Linux compete better with Microsoft. The drivers are really geared at making Windows a better host for Linux.

"The Linux device drivers we are releasing are designed so Linux can run in enlightened mode, giving it the same optimiz...


Continue reading ...
 

Linux exploit gets around security barrier

Posted by Oyya-Info on Tuesday, July 21, 2009, In : Security 

A security researcher has released zero-day code for a flaw in the Linux kernel, saying that it bypasses security protections in the operating system.

The source code for the exploit was made available last week by researcher Brad Spengler on the Dailydave mailing list. According to the researcher, the code exploits a vulnerability in Linux version 2.6.30, and 2.6.18, and affects both 32-bit and 64-bit versions. The 2.6.18 kernel is used in Red Hat Enterprise Linux 5.

The exploit bypasses nul...


Continue reading ...
 

Symbian admits Trojan slip-up

Posted by Oyya-Info on Saturday, July 18, 2009, In : Security 

The Symbian Foundation has acknowledged that its process for keeping malicious applications off Symbian OS-based phones needs improvement, after a Trojan horse program passed a security test.

The botnet-building Trojan, which calls itself "Sexy Space," passed through the group's digital-signing process, Symbian's chief security technologist Craig Heath said Thursday. Heath said the group is working on improving its security-auditing procedure.

"When software is submitted, we do try to filt...


Continue reading ...
 

Wikipedia's controversial video player coming soon

Posted by Oyya-Info on Saturday, July 18, 2009, In : TechNews 

Wikipedia users will be getting new tools for uploading, editing, and viewing video very soon. According to a Beet.TV interview with Erik Moller, who is the deputy director of the Wikimedia Foundation, we'll see all of these things shortly. However, what's more interesting is the Web encyclopedia's choice of video formats and how it fits into a fracas in the browser world.

Wikipedia has been working on video support for years, and is putting considerable effort into making it easier for users...


Continue reading ...
 

Google fixes flaws in Chrome

Posted by Oyya-Info on Friday, July 17, 2009, In : Google 

New versions of Google Chrome are out, fixing bugs and patching security holes in both the stable build and the beta build.

Two serious security flaws have been plugged. One had allowed for malicious code exploitation within the Chrome tab sandbox. Found by the Google security team, the threat was serious enough that Google has declined to be more specific until "a majority of users are up to date with the fix," the company said in a blog post.

A second security risk caused by memory corru...


Continue reading ...
 

Will Apple sue Microsoft over Laptop Hunter ads?

Posted by Oyya-Info on Friday, July 17, 2009, In : TechNews 

Back in May, my crystal ball twitched with wonderment at the idea that Microsoft might be feeling a frisson of excitement that Apple had decided to make an ad in response to Redmond's "Laptop Hunters" campaign.

I suggested that Microsoft executives would be dancing with fair glee and abandon.

It seems that, for once, my crystal ball may not have been full of Bay Area fog.

The revelation that Apple's lawyers allegedly called Microsoft to complain about the Laptop Hunters ads has brought much ...


Continue reading ...
 

Microsoft eases back on IE 8 default

Posted by Oyya-Info on Friday, July 17, 2009, In : Microsoft 
For people who've set other browsers set as default, the IE 8 installer now always asks whether they want to make IE the new default.

For people who've set other browsers set as default, the IE 8 installer now always asks whether they want to make IE the new default.

(Credit: Microsoft)

Responding to widespread carping, Microsoft has made it less likely that Internet Explorer 8 will become the default browser against the user's wishes.

Previously, installing the browser offered an "express settings" that would make IE 8 the default browser without asking, though the custom settings route explicitly asked. Now the express ...


Continue reading ...
 

Sun shareholders approve Oracle merger - Update

Posted by Oyya-Info on Thursday, July 16, 2009, In : Business Tech 

Sun Microsystems announced Thursday that the stockholders at its special meeting voted in favor of the merger agreement with Oracle.

Investors holding approximately 62 percent of all shares of Sun common stock voted yes to the deal under which Oracle will acquire Sun for $9.50 a share in cash, a total of $7.4 billion, or $5.6 billion net of Sun's cash and debt.

The acquisition still faces antitrust scrutiny by the U.S. Department of Justice over one sticking point on Java licensing. But Oracl...


Continue reading ...
 

Intel Core i7 laptops coming--or have they already arrived?

Posted by Oyya-Info on Thursday, July 16, 2009, In : Reviews 

Waiting for a Core i7 laptop? While Intel is slated to release its first mobile "Nehalem" Core i7 processor in the coming months, the desktop counterpart has already spawned a cottage industry of benchmark-busting laptops.

"It's completely revitalized the desktop replacement laptop," said Kelt Reeves, president of enthusiast PC maker Falcon Northwest, referring to designs that have shoehorned a desktop Core i7 processor into a laptop enclosure.

At the very high end of Falcon Northwest's lin...


Continue reading ...
 

Zero-day flaw found in Firefox 3.5

Posted by Oyya-Info on Wednesday, July 15, 2009, In : Security 

There is a critical JavaScript vulnerability in the Firefox 3.5 Web browser, Mozilla has warned.

The zero-day flaw lies in Firefox 3.5's Just-in-time (JIT) JavaScript compiler. Proof-of-concept code to exploit the vulnerability has been posted online by a security research group, Mozilla said in a post on its security blog on Wednesday. Security company Secunia rated the vulnerability as "highly critical" on Wednesday.

The hole could allow a hacker to launch a "drive-by" attack, according to...


Continue reading ...
 

Survey: Why do people respond to spam?

Posted by Oyya-Info on Wednesday, July 15, 2009, In : Reviews 

Most people may think they're smart enough not to answer an obvious spam message. But is that really the case?

Almost one third of consumers questioned admitted answering e-mails they suspected were spam, says a survey released Wednesday by the Messaging Anti-Abuse Working Group (MAAWG).

Among those who responded to spam, 17 percent said they clicked on it by mistake, 13 percent said they sent a note to the spammer to complain, while 12 percent said they were interested ...


Continue reading ...
 

GE: Smart grid yields net-zero energy home

Posted by Oyya-Info on Tuesday, July 14, 2009, In : TechNews 
General Electric unveiled a project at its research labs that will let homeowners cut annual energy consumption to zero by 2015.

These "net-zero energy homes" will combine on-site power generation through solar panels or wind turbines with energy-efficient appliances and on-site storage. Consumers will get detailed energy data and potentially control appliances with Home Energy Manager, a device that is expected to cost between $200 and $250, according to GE executives at a smart grid media ...


Continue reading ...
 

Microsoft releases Office 2010 details, test code

Posted by Oyya-Info on Tuesday, July 14, 2009, In : Microsoft 

The next version of Office moved a step closer to reality on Monday as Microsoft released an invitation-only technical preview of Office 2010.

However, the release of the software will be limited. Attendees of this week's Worldwide Partner Conference in New Orleans, as well as the recent TechEd show, will gain access to the desktop versions of Office 2010. Microsoft has also been taking sign-ups via its Office 2010: The Movie teaser Web site.

Also, it won't show off the program's biggest ch...


Continue reading ...
 

Bing claims 8 percent rise in users during June

Posted by Oyya-Info on Tuesday, July 14, 2009, In : Microsoft 

Microsoft's internal data credits the launch of its new Bing search engine with an 8 percent boost in unique visitors during June.

It's been clear for a while that Bing's launch produced gains for Microsoft during its initial month, but the degree to which that gain was produced by those strolling by as a lark or by those actually using the service daily was unclear. Microsoft released data Monday claiming an 8 percent gain in unique users during the month, and said "based on our own polling...


Continue reading ...
 

Google sees separate paths for Android, Chrome OS

Posted by Oyya-Info on Friday, July 10, 2009, In : Google 
Among the many questions raised in the wake of Google's announcement of Chrome OS is exactly how the project fits in with Google's Android mobile operating system.

Essentially, nothing has changed, said Google's Andy Rubin at a press conference Friday morning highlighting Google and T-Mobile's partnership on the launch of the new MyTouch 3G smartphone. "You need different technology for different products," Rubin said, explaining that Google's approach to product development means that projec...


Continue reading ...
 

Botnet worm in DOS attacks could wipe data out on infected PCs

Posted by Oyya-Info on Friday, July 10, 2009, In : Security 

The denial of service attacks against Web sites in the U.S. and South Korea that started last weekend may have stopped for now, but code on the infected bots was set to wipe data on Friday, security experts said.

There were no immediate reports of any of the compromised PCs in the botnet having files deleted, but that doesn't mean it wasn't happening or won't in the future, said Gerry Egan, a product manager in Symantec's Security Technology Response group.

There are only about 50,000 infe...


Continue reading ...
 

Why Chrome OS? Google says, why not?

Posted by Oyya-Info on Thursday, July 9, 2009, In : Google 

Google has long worked on expanding its reach beyond mere Internet search. And as many had suspected, it confirmed late Tuesday night that it plans to develop a lightweight operating system based on Linux and Web standards for personal computers.

Why? Well, Google's standard response to any question about why it's working on something other than search is to de...


Continue reading ...
 

Google plans Chrome-based Web operating system

Posted by Oyya-Info on Wednesday, July 8, 2009, In : Google 

That Google operating system rumor is coming true--and it's based on Google's browser, Chrome.

The company announced Google Chrome OS on its blog Tuesday night, saying lower-end PCs called Netbooks from unnamed manufacturers will include it in the second half of 2010. Linux will run under the covers of the open-source project, but the applications will run on the Web itself.

In other words, Google's cloud-computing ambitions just got a lot bigger.

"Google Chrome OS is being created for peo...


Continue reading ...
 

Microsoft warns of hole in Video ActiveX control

Posted by Oyya-Info on Monday, July 6, 2009, In : Security 

Microsoft on Monday warned of a vulnerability in its Video ActiveX Control that could allow an attacker to take control of a PC if the user visits a malicious Web site.

There have been limited attacks exploiting the hole, which affects Windows XP and Windows Server 2003, Microsoft said on its Security Response Center blog.

This is the second DirectShow security hole Microsoft has announced in the past few months. The company has yet to provide a security update for a vulnerability announced ...


Continue reading ...
 

IE market share plummeting! (Or is it?)

Posted by Oyya-Info on Monday, July 6, 2009, In : TechNews 
Microsoft's Internet Explorer's market share is absolutely falling. The question is, by how much?

I've reported before that Internet Explorer (IE) drops 5 percent market share points each year, while Mozilla Firefox gains 5 percentage points per year. But what is becoming increasingly clear is that IE's market share may be dropping more precipitously than previously reported, falling to 60 percent share in June 2009 instead of the 68 percent share expected.

Or is it?

The answer may depend on t...


Continue reading ...
 

Postini: Google's take on e-mail security

Posted by Oyya-Info on Thursday, July 2, 2009, In : Security 

The computer security industry historically borrows military defense concepts to combat digital threats, literally creating war rooms where experts follow attacks in progress on huge screens with phones ringing off the hook. 

Not so at Google's Postini e-mail security service provider unit. Instead, computerized systems monitor 3 billion messages per day that flow in and out of customer systems and pass through Postini's thousands of machines in data centers around the U.S. and in Europe befo...


Continue reading ...
 

Making sense of Windows 7 upgrade options

Posted by Oyya-Info on Tuesday, June 30, 2009, In : Reviews 

While it's true Windows 7 doesn't arrive on retail shelves and new PCs until October, Microsoft has announced two programs designed to give a head start to those who know they want the new operating system.

The Windows Upgrade Option, which runs through early next year, allows those buying a new Vista PC to get a free copy of Windows 7 after it hits shelves in October. The other program, which runs only through July 11, allows Windows XP and Vista users to pre-order a copy of Windows 7 Home...


Continue reading ...
 

Mozilla's Weave: (Too far) Ahead of its time

Posted by Oyya-Info on Tuesday, June 30, 2009, In : TechNews 
Mozilla just released Weave Sync 0.4.0, but the reality is that it will take a long time before we need a 1.0 of Weave. Weave Sync coordinates your Firefox bookmarks, browser history, saved passwords, and tabs across your various Firefox installations: desktop, laptop, Netbook, and mobile.

The problem with this vision is that today it's largely unnecessary. For a variety of reasons (some very good, some not so good), Mozilla's mobile Firefox--codenamed "Fennec"--runs on Windows Mobile (versio...


Continue reading ...
 

Why Oracle will continue to win?

Posted by Oyya-Info on Monday, June 29, 2009, In : TechNews 

I was somewhat shocked by the stellar results Oracle recently reported, considering the sorry state of the economy. I even called an analyst friend to find out if maybe there was some house of cards ala Computer Associated that explained the consistent rise in revenue and margin. But I was reminded of two simple facts explaining why Oracle remains dominant:

  1. Applications drive database sales
  2. Oracle owns pretty much everything

Oracle's acquisition streak has given the company an enormous bre...


Continue reading ...
 

Should Oracle's Linux strategy be...Ubuntu?

Posted by Oyya-Info on Friday, June 26, 2009, In : TechNews 
Oracle has gone on a buying spree in the past few years, consolidating an impressive portfolio of market-leading technology. But there's one thing it still lacks, despite awkward efforts to fill the void: an operating system. Though Oracle has unsuccessfully courted Red Hat as an acquisition target for years, its affections might be better placed on Ubuntu.

Yes, by acquiring Sun, Oracle is gaining Solaris, but as Red Hat CEO Jim Whitehurst indicated in the Red Hat earnings call on Wednesday, t...


Continue reading ...
 

Google bringing AdSense to mobile apps

Posted by Oyya-Info on Thursday, June 25, 2009, In : Google 

Android and iPhone developers looking for an extra source of revenue will soon have an advertising option, sponsored by Google.

Google's AdSense program--in which it sells and distributes ads to third-party publishers--is coming to mobile devices as a beta program, the company announced Wednesday. A small group of developers have been testing this program but now anyone can apply, said Susan Wojcicki, vice president of product management, in a blog post.

Mobile apps are one of the hottest top...


Continue reading ...
 

Google and the billion-dollar HTML tag

Posted by Oyya-Info on Thursday, June 25, 2009, In : Google 

SAN JOSE, Calif.--Those who think HTML tags are low-level technology should realize they can have a huge impact on the bottom line.

By finding an HTML tag that allowed Google to offer ads on the right hand side of its search page without delaying page loading times, Google was able to cash in without harming the user experience, said Marissa Mayer, vice president for search products and experience, at the O'Reilly Velocity 2009 conference. There aren't a whole lot of "billion-dollar HTML tags...


Continue reading ...
 

Microsoft Security Essentials not quite a must-have

Posted by Oyya-Info on Wednesday, June 24, 2009, In : Security 

Microsoft on Tuesday released its latest foray into security software as a limited beta. Microsoft Security Essentials, known in development as Morro, is limited to 75,000 downloads in four countries: the United States, Israel, Brazil, and China.

Security Essentials contains all the basic features that users have come to expect from free security software: multiple built-in and customizable scan options, a scheduler, automatic definition file updates, a real-time defense shield, and rootkit...


Continue reading ...
 

Google to highlight Web's need for speed

Posted by Oyya-Info on Wednesday, June 24, 2009, In : Google 

Few would disagree that faster is better when it comes to the Web, and Google wants to get Web publishers hooked on speed.

Webmasters looking for ways to speed up page loading times will have a host of tips and tricks to peruse later Tuesday when Google launches a new Web site designed to emphasize the importance of speed on the Web, said Richard Rabbat, a product manager at Google. Google engineering gurus Bill Coughran and Urs Hoelzle plan to unveil the initiative in a blog post unveiling ...


Continue reading ...
 

Q&A: Mark Abene, from 'Phiber Optik' to security guru

Posted by Oyya-Info on Wednesday, June 24, 2009, In : Reviews 

Mark Abene first started using computers when he was about 9 years old, and by 12 he was exploring the electronic frontier from his home in Queens, New York. On bulletin board systems he swapped information with other phone phreakers and hackers, who formed the "Masters of Deception" group and inspired a book.

Abene, whose handle was "Phiber Optik," later received a one-year prison sentence for computer-related activities committed when he was a minor from a judge who said he wanted to send ...


Continue reading ...
 

Google's vision improving for image search

Posted by Oyya-Info on Monday, June 22, 2009, In : Google 
Google thinks it has made a breakthrough in "computer vision."

Imagine stumbling upon a picture of a beautiful site in Europe filled with ancient ruins, one you didn't recognize at first glance while searching for vacation destinations online. Google has developed a way to let a person provide Google with the URL for that image and search a database of over 40 million geotagged photos to match that image to verified landmarks, giving you a destination for that next trip.

The project is still ...


Continue reading ...
 

Microsoft's free anti-malware beta to arrive next week

Posted by Oyya-Info on Friday, June 19, 2009, In : Security 

Microsoft will launch a public beta of its anti-malware service, Microsoft Security Essentials, on Tuesday as it phases out its Live OneCare suite in favor of a simpler free consumer security offering.

Microsoft Security Essentials, which will run on Windows XP, Vista, and Windows 7, will be available in the U.S., Brazil, and Israel in English and Brazilian Portuguese. A public beta version for Simplified Chinese will be available later in the year.

The service works like traditional antivi...


Continue reading ...
 

Google considers request to boost privacy

Posted by Oyya-Info on Wednesday, June 17, 2009, In : Security 

PST to clarify that Gmail data has always been encrypted by default when a user types in https:// and that last year they offered the ability to set https:// as the default.

More than three dozen security and privacy advocates and researchers are asking Google to offer better data protection for users of Gmail and other Google apps and Google said on Tuesday that it is considering doing that, if it doesn't slow down the apps too much.

You may not know this but you can set Gmail to encrypt ...


Continue reading ...
 

Dasient helps Web sites avoid blacklists, malware

Posted by Oyya-Info on Tuesday, June 16, 2009, In : Security 

Last week, PBWorks founder David Weekly found out from some customers that his hosted collaboration site had been blacklisted by Symantec for hosting malware and, thus, visitors to any of the 10 million pages on PBWorks were being warned that the site wasn't safe.

"(Damn) you, Norton Safe Web. Whenever one file on one PBWorks space has a virus, all of PBworks is marked unsafe?!" a frustrated Weekly wrote on Twitter and Facebook on Thursday. In a follow-up interview, he said: "That's tarnishi...


Continue reading ...
 

Why Google might want you to think it's scared of Bing

Posted by Oyya-Info on Tuesday, June 16, 2009, In : Google 

So the Googlies are, allegedly, gnashing and wailing.

Their ears, their nostrils, even their fully formed eyebrows are twitching beyond all human control.

Though I am not one of those who necessarily subscribes to the idea that Googlies ever have extreme emotions, the rumor is that they are in a fizzy tizzy. Because of Bing, the new search fragrance from Microsoft.

According to a report, Google's Sergey Brin has ordered some of his finest brains to take Bing apart as if it were a secretly smu...


Continue reading ...
 

New Linux kernel adds file-system support

Posted by Oyya-Info on Monday, June 15, 2009, In : Business Tech 

Linux kernel version 2.6.30 has been released, adding support for new file systems, performance improvements, and new hardware drivers.

The Linux kernel is the core used by GNU/Linux operating system distributions from Red Hat, Novell, and others. The new release was made final and was publicized in a newslist post from Linux developer Linus Torvalds last week.

The most prominent new features include support for two new file systems, according to release notes published by Kernelnewbies, a ...


Continue reading ...
 

The skinny on power management in Windows 7

Posted by Oyya-Info on Monday, June 15, 2009, In : Reviews 

Microsoft has made energy efficiency a key design element of Windows 7, focusing on better power management for end users and centralized tools for IT pros, company executives said Friday.

Company engineers sought to make power management features more accessible than previous versions of Windows while at the same time, giving people the ability to customize settings.

The operating system, which will be released in October, by default is smarter about what to turn on when, according to ...


Continue reading ...
 

Bing modified to enable porn filtering

Posted by Oyya-Info on Monday, June 15, 2009, In : Microsoft 

After plenty of coverage about how its Bing search engine makes it all too easy for kids to find and view porn, Microsoft has made some changes that will make it easier for parents to block or monitor what their kids are viewing on the site.

In a blog post, Microsoft announced that it is making two changes the company thinks will help address the issue.

According to the post, "explicit images and video content will now be coming from a separate single domain, explicit.bing.net. This is i...


Continue reading ...
 

The botnet threat in China's censorship software

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Experts have warned of serious security flaws in the Chinese government's censorship software, which could open the door to hackers creating huge botnets.

Programming errors in the Green Dam Youth Escort software, which the Chinese Ministry of Industry and Information Technology said Tuesday must be preinstalled on all new computers in the country, are at the root of the flaws, according to experts from the University of Michigan.

"Once Green Dam is installed, any website the user visits ...


Continue reading ...
 

Look Ma, I created a botnet!

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

The abstract concepts of "botnet" and "Trojan" just became a lot more concrete for me.

In less than an hour on Thursday, I was able to use programs readily available on the Internet underground for as little as $300 to infect several Windows clients and take complete control of them in a test environment.

In contrast to the real world, the McAfee Malware Experience event, which was akin to a Malware 101 class (or, in my case, Malware ...


Continue reading ...
 

Who wins, loses with browser-less Windows 7

Posted by Oyya-Info on Monday, June 15, 2009, In : Microsoft 

Microsoft's move to offer Windows 7 in Europe without a browser may help rivals, but it could make life more difficult for European consumers, particularly those who want to upgrade their existing machines.

As first reported earlier on Thursday by CNET News, Microsoft plans to ship Windows 7 to both PC makers and retail stores with Internet Explorer removed.

Now, most people will get Windows 7 on a new PC. Presumably, in that case, the computer maker will chose to add back Internet Explor...


Continue reading ...
 

Microsoft takes aim at fake antivirus program

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Microsoft's Malicious Software Removal Tool was updated this week to detect a generic type of fake antivirus program known as "Win32/InternetAntivirus."

The Microsoft Malware Protection Center gives Win32/InternetAntivirus an alert level of "severe." The software is "a rogue program that displays false and misleading alerts regarding malware, in order to convince users to purchase rogue security software," according to a Microsoft Malwa...


Continue reading ...
 

Mac OS X vs. Windows 7: Who has the best upgrade?

Posted by Oyya-Info on Monday, June 15, 2009, In : Reviews 

Apple and Microsoft are fighting for the mindshare of consumers as both companies prepare to roll out upgrades to their operating systems later this year.

Apple on Monday showed Worldwide Developers Conference attendees Snow Leopard, the next major version of Mac OS X. Apple has been very open about the fact that Snow Leopard is meant to be an under-the-hood maintenance release, focusing on performance enhancements to the operating system.

Windows 7 is essentially Microsoft's maintena...


Continue reading ...
 

Sun investors to vote on Oracle on July 16

Posted by Oyya-Info on Monday, June 15, 2009, In : Business Tech 
Tune in on July 16 to see whether Oracle actually becomes the new parent of Sun Microsystems.

Sun's board of directors has set up a special shareholder meeting for that date to vote on the proposed merger with Oracle, according to a statement Sun released Monday. Sun's board, which has already okayed the merger, is urging stockholders to approve the deal--a majority vote is needed to push it through.

Shareholders can vote on the merger in person, at Sun's Web site, or through a proxy card rece...


Continue reading ...
 

Storage software industry takes a revenue hit

Posted by Oyya-Info on Monday, June 15, 2009, In : Business Tech 

The storage software industry has seen its first quarterly sales decline after more than five years of solid growth, according to a report from market researcher IDC.

First-quarter 2009 revenue for the industry sank 5.2 percent to $2.8 billion from the previous year. The slump has impacted several key vendors, including Hewlett-Packard, EMC, and IBM, all of which sell storage software to enterprise clients.

"The combination of the normally slow first quarter for most companies with the contin...


Continue reading ...
 

Hacker named to Homeland Security Advisory Council

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Jeff Moss, founder of the Black Hat and Defcon hacker and security conferences, was among 16 people sworn in on Friday to the Homeland Security Advisory Council.

The HSAC members will provide recommendations and advice directly to Secretary of Homeland Security Janet Napolitano.

Moss' background as a computer hacker (aka "Dark Tangent") and role as a luminary among young hackers who flock to Defcon in Las Vegas every summer might seem to make him an odd choice to swear allegiance to the...


Continue reading ...
 

ATM malware lets criminals steal data and cash

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Malware has been found on ATMs in Eastern Europe and elsewhere that allows criminals to steal account data and PINs and even empty the machine of its cash, a computer forensics expert said.

About 20 ATMs have been compromised in that manner, mostly in Russia and the Ukraine, but there are "early indications" of compromised ATMs in the U.S., said Nicholas Percoco, vice president and head of SpiderLabs at Trustwave, which provides data security and payment card compliance services.

Percoco ...


Continue reading ...
 

Google Squared goes live with mixed results

Posted by Oyya-Info on Monday, June 15, 2009, In : Google 

Google Squared developers are quite welcome to join my fantasy baseball team next year.

Google turned on Google Squared Wednesday, letting the public test out its attempt to present search results in grid format.

Google Squared was first demonstrated at Google's Searchology event in May, when the company showed off how a query for a category such as "U.S. Presidents" would return a number of results for the gentlemen who have held that office sorted by categories, such as political party, n...


Continue reading ...
 

McAfee's new family shield

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

On the heels of Symantec's OnlineFamily.Norton released earlier this year, security stalwart McAfee jumps into the family protection game with a new home-oriented protection program. Called McAfee Family Protection, the program offers many familiar tools to parents in the hopes of fostering conversation while protecting children from harm.

McAfee Family Protection protects children based on multiple levels of technology.

(Credit: McAfee)

McAfee Family Protection offers block...


Continue reading ...
 

Data backup service leads to recovery of stolen laptop

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Using a data backup program helps recover lost data but can also help get a stolen laptop back--if you're lucky.

A Berkeley, Calif., man recently recovered his stolen laptop after seeing photos the thief took of himself with the built-in camera via his Internet-based data backup program.

That's according to a police officer's article in an e-mail newsletter from Berkeley City Councilmember Susan Wengraf that was posted to the Web by open-source advocate Bruce Perens.

It all started on ...


Continue reading ...
 

Turkish hackers breached U.S. Army servers

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Hackers based in Turkey penetrated two U.S. Army Web servers and redirected traffic from those Web sites to other pages, including one with anti-American and anti-Israeli messages, according to a report in InformationWeek.

The hackers, who go by the group name "m0sted," breached a server at the Army's McAlester Ammunition Plant in Oklahoma on January 26 and a server at the U.S. Army Corps of Engineers' Transatlantic Center in Winchester, Va., on September 19, 2007, the report said.

Inve...


Continue reading ...
 

Gumblar attack is alive, worse than Conficker

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

The Web site compromise attack known as Gumblar has added new domain names that are downloading malware onto unsuspecting computers, stealing FTP credentials to compromise more sites, and tampering with Web traffic, a security firm said on Thursday.

The Gumblar attack started in March with Web sites being compromised and attack code hidden on them. Originally, the malware downloaded onto computers accessing those sites came from the gumblar.cn domain, a Chinese domain associated with Russ...


Continue reading ...
 

Clickjacking: Hijacking clicks on the Internet

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

What if you reached to grab a newspaper out of a news stand and you found a rock in your hand instead? How about opening the front door to a grocery store and ending up on a boat?

This sounds like a Matrix movie, but the virtual equivalent of this is real and poses one of the most serious new risks on the Internet, according to Jeremiah Grossman, chief technology officer and co-founder of Whitehat Security.

"Most exploits (like worms and attacks that take advantage of holes in software) ca...


Continue reading ...
 

Microsoft warns of new server vulnerability

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

A new, unpatched vulnerability exists in one of Microsoft's server products, the company warned late Monday.

In a technical bulletin, the company said it is looking into "public reports of a possible vulnerability in Microsoft Internet Information Services (IIS)."

The company said that a flaw exists in a certain type of Web serving operation.

"An elevation of privilege vulnerability exists in the way that the WebDAV extension for IIS handles HTTP requests," Microsoft said. "An attacker ...


Continue reading ...
 

Protecting yourself from vishing attacks

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

You might have heard about online "phishing" scams designed to steal money from unsuspecting Web users, but now criminals are using another type of scam called "vishing" to commit the same crimes.

Last week, the Federal Trade Commission filed lawsuits against two telemarketing firms in Florida and a company claiming to sell extended automobile warranties for violating the Do Not Call registry and fraud for selling bogus warranties for between $2,000 and $3,000 a pop. Since 2007, the compan...


Continue reading ...
 

Gmail helps you migrate from other e-mail services

Posted by Oyya-Info on Monday, June 15, 2009, In : Google 

Correction: This article was updated at 11:10 PDT to remove the statement that AOL doesn't allow using non-AOL e-mail clients to access its e-mail, which is untrue.

It's been a challenge to persuade my friends to move on from AOL. It's not because I am not convincing enough (I am!), it's just that it's impossible for them to move their e-mail archive and contacts to a new non-AOL account.

(Credit: Gmailblog)

But now my persuasion level has just been raised a notch as Gmail announced Wednesd...


Continue reading ...
 

Google revises AdWords trademark policy

Posted by Oyya-Info on Monday, June 15, 2009, In : Google 

Google has revised its policy on trademarks appearing in keyword ads, allowing brand names to appear in AdWords copy.

Google will begin accepting new ads that contain trademark terms on Friday although the ads will not begin appearing online until June 11, Dan Friedman, a member of the Inside AdWords crew, announced Thursday in a company blog:

In an effort to improve ad quality and user experience, we are adjusting our trademark policy in the U.S. to allow some ads to use trademarks in ...

Continue reading ...
 

Pirated Windows 7 RC builds botnet

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

A pirated version of Windows 7 Release Candidate infected with a Trojan horse has created a botnet with tens of thousands of bots under its control, according to researchers at security firm Damballa.

The software, which first appeared on April 24, spread as quickly as several hundred new bots per hour, and controlled roughly 27,000 bots by the time Damballa took over the network's command and control server on May 10, the firm said Tuesday.

The pirated software was spread via popular pir...


Continue reading ...
 

Google fine-tunes : new filters + visualized results

Posted by Oyya-Info on Monday, June 15, 2009, In : Google 

Marissa Mayer, vice president of search products and experience, led a parade of the company's product managers on stage at Searchology 2009 to demonstrate the new features, known as Google Search Options, Google Squared, and Rich Snippets. Search Options will be rolling out gradually on Tuesday, giving searchers ways to filter their results based on factors like timeliness, result type such as image or videos, or a desire to see search results in visual form.

The announcements "center ar...


Continue reading ...
 

Microsoft patches critical PowerPoint hole

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Microsoft on Tuesday released a patch aimed to fix a critical vulnerability in PowerPoint that had already led to exploits.

The vulnerability is listed as critical for Office 2000, but rated only as important for Office XP, Office 2003, and Office 2007. However, the hole had already formed the basis of targeted attacks, prompting Microsoft to issue a warning last month.

Although Microsoft says the hole is now patched in the Windows version of P...


Continue reading ...
 

Google Chrome ads coming to TV

Posted by Oyya-Info on Monday, June 15, 2009, In : Google 

Google plans to make its first foray into the old-fashioned world of television advertising with spots promoting its Chrome browser this weekend.

Google Japan had already released a 30-second video promoting Chrome on YouTube, but the company will distribute that video through the Google TV Ads network this weekend as an experiment to see if it can drum up interest in Chrome, its new browser. Google said it's using the research it has done on measuring the relevance of television ads in o...


Continue reading ...
 

Analyst: Google will walk away from bad AdSense deals

Posted by Oyya-Info on Monday, June 15, 2009, In : Google 
Are the days of silly AdSense deals with the likes of MySpace and AOL over for Google? Bernstein analyst Jeffrey Lindsay seems to think so. The analyst upped his price target to $600 for Google shares on the theory that the economy is rebounding and the search giant's revenue per click ratio will follow. Meanwhile, Google's profit margins are likely to go higher.

And Google's ability to walk away from high-cost AdSense deals are one reason those margins are headed higher. Lindsay writes in a ...


Continue reading ...
 

Citrix updates XenServer and Essentials

Posted by Oyya-Info on Monday, June 15, 2009, In : Business Tech 

Citrix has introduced updates to XenServer, its free virtualization platform, and to Citrix Essentials for XenServer and Hyper-V, its virtualization management package.

The new 5.5 release of XenServer, which Citrix began offering as a free download in February, is designed to provide easier virtualization management and broader integration with enterprise systems, the company said in its announcement Wednesday. This includes hooks that allow third-party products to interact with XenServer...


Continue reading ...
 

Cybercriminals use fake search engines to spread malware

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Cybercriminals have moved on from search engine optimization techniques and are now creating fake search sites designed solely to direct Web surfers to pages hosting malware, Panda Security warned on Wednesday.

Previously, attackers resorted to sending e-mails with malicious code in attachments and with links to malicious Web sites and took measures to push those Web sites higher in search engine rankings. Now, they're also creating fake search engines that ...


Continue reading ...
 

McAfee blasted for having holes in its Web sites

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Security researcher Mike Bailey released this screen shot showing that he gained access to McAfee Secure via a cross-site request forgery hole.

Security vulnerabilities on McAfee sites, including one designed to scan customers' sites for flaws, exposed certain customer accounts and could have been used for phishing attacks in which malware disguised as McAfee software could be distributed, security experts say.

McAfee said late on Tuesday that most of the vulnerabilities were fixed, excep...


Continue reading ...
 

Feds' red tape left medical devices infected with computer virus

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

The Conficker Internet virus has infected important computerized medical devices, but governmental red tape interfered with their repair, an organizer of an antivirus working group told Congress on Friday.

Rodney Joffe, one of the founders of an unofficial organization known as the Conficker Working Group, said that government regulations prevented hospital staff from carrying out the repairs.

Joffe, who also is the senior vice president for the telecom clearinghouse Neustar, told a panel of ...


Continue reading ...
 

Google Chrome patch fixes vanishing scrollbar

Posted by Oyya-Info on Monday, June 15, 2009, In : Google 

Did you pine for those missing Gmail scrollbars when using the latest version of Chrome, as I did? Pine no more, because Google said its latest developer release of the open-source browser gives them back.

Chrome 2.0.177.1 is on the developer preview release channel, not the better-tested beta or stable channels, so not everyone will get it. (You can sign up for the developer or beta channels by downloading the Chrome Channel Changer, but be warned that you have to uninstall them if you w...


Continue reading ...
 

Google Custom Search Cuts uTorrent Off

Posted by Oyya-Info on Monday, June 15, 2009, In : Google 
The immensely popular BitTorrent client uTorrent recently added a Google powered torrent search engine to its website. This added search capability used Google’s custom search program and allowed visitors to search for .torrent files on Google. For reasons unknown, Google appears to be blocking the use of its search technology on the site.

With over 28 million active users a month, uTorrent has established itself as the client of choice for most BitTorrent users. In an attempt to bring in so...

Continue reading ...
 

SAP software revenue skids in first quarter

Posted by Oyya-Info on Monday, June 15, 2009, In : Business Tech 

SAP's first-quarter software revenue--an indicator of maintenance and services health--skidded 33 percent due to a "difficult operating environment" and a tough year-ago comparison. Meanwhile, SAP altered its maintenance pricing plans to allay customer concerns.

SAP on Wednesday reported first-quarter net income of 204 million euros, down from 242 million euros a year ago. Revenue was 2.39 billion euros, down from 2.46 billion euros a year ago. SAP managed to hold software and software-rel...


Continue reading ...
 

Is RAID storage living on borrowed time?

Posted by Oyya-Info on Monday, June 15, 2009, In : TechNews 

The basic idea of RAID (Redundant Array of Inexpensive Disks) storage is combining multiple small, cheap disk drives into an array of disk drives (appearing to the computer as a single logical storage unit) that yields performance exceeding that of a SLED (Single Large Expensive Drive).

RAID offers many advantages over the use of single hard disks, including higher data security, fault tolerance, improved availability, and integrated capacity.

That said, RAID was invented more than 30 ...


Continue reading ...
 

Microsoft tightens Windows 7 security for USB drives

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

In the wake of the Conficker worm spreading via removable storage devices among other methods, Microsoft said on Tuesday it is making a change to the way Windows 7 handles USB drives.

As a result of the change, most USB drives will not be able to automatically launch a program using a Windows feature known as AutoRun, Microsoft said in a post on its Security Research & Defense Blog.

So, if an infected USB drive is inserted on a machine then the AutoRun task will not be displayed, Microso...


Continue reading ...
 

McAfee launches free online cyber crime help center

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Is your computer acting funny? Are you worried that you may have visited a malicious Web site or opened an e-mail attachment with malware?

Instead of worrying about it you can now go to a new Web site McAfee is launching on Tuesday that is designed to help computer users figure out if they have legitimate reason to be concerned.

The new Cybercrime Response Unit offers a forensic scanning tool that checks for malware on the computer and cookies left by suspicious Web sites to help deter...


Continue reading ...
 

Does HP need a dose of anarchy?

Posted by Oyya-Info on Monday, June 15, 2009, In : TechNews 

It all seems obvious when viewed through hindsight's pristine lens: Hewlett-Packard didn't need a reinvention. It just needed some fierce fiscal discipline to transform itself from a bumbling, lost soul into a well-oiled profit machine.

At its core, HP's turnaround works against the natural order of things in Silicon Valley, where people talk about technology first and finances a distant second. The frenetic hunt for the next big thing has helped a select few endure decades of busts and boo...


Continue reading ...
 

Conficker virus begins to attack computers

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Conficker, also known as Downadup or Kido, was expected to wreak havoc on April 1 when it was due to be activated, but it failed to cause many problems.

Internet virus experts, however, claim it is now quietly turning thousands of personal computers into servers of e-mail spam and installing spyware.

The worm started spreading late last year, infecting millions of computers and turning them into "slaves" that respond to commands sent from a remote server that effectively ...


Continue reading ...
 

White House may relieve DHS of cybersecurity role

Posted by Oyya-Info on Monday, June 15, 2009, In : Politics and Law 

SAN FRANCISCO--The federal official overseeing a 60-day review of the U.S. government's cybersecurity efforts indicated Wednesday that the final report recommends shifting more responsibilities to the White House.

"It provides the president with recommendations for a White House organizational structure that can effectively address cyberspace-related issues," Melissa Hathaway, acting cyberspace director for the White House's National Security and Homeland Security councils, said at the RS...


Continue reading ...
 

Public-private security cooperation at RSA

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

In past years, I looked at the RSA security conference as a high-tech flea market staffed by the world's best security carnival barkers. Yes, important security topics were discussed, but the real focus of the show was selling products and doing deals.

This year's event has its share of tacky presentations and booth babes, but I'm hearing a lot of chatter about a far more important topic: the state of information security and its impact on us all. Finally, the combination of unending dat...


Continue reading ...
 

F-Secure says stop using Adobe Acrobat Reader

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

With all the Internet attacks that exploit Adobe Acrobat Reader people should switch to using an alternative PDF reader, a security expert said at the RSA security conference on Tuesday.

Of the targeted attacks so far this year, more than 47 percent of them exploit holes in Acrobat Reader while six vulnerabilities have been discovered that target the program, Mikko Hypponen, chief research officer of security firm F-Secure, said in a briefing with journalists.

Just last month, Adobe iss...


Continue reading ...
 

Microsoft exec: Internet still not safe enough

Posted by Oyya-Info on Monday, June 15, 2009, In : Microsoft 

SAN FRANCISCO--Microsoft's operating systems are still vulnerable to attacks, but more often than not it's older versions that are taking the big hits.

That was the message from Scott Charney, corporate vice president in Microsoft's Trustworthy Computing group, when he sat down with me on Tuesday. We chatted about the latest threats, including Conficker. The much-maligned Windows Vista, he noted, wasn't hit in the way that older versions of the operating system were.

"Some of those widesp...


Continue reading ...
 

Firefox 3.0.9 targets 12 security vulnerabilities

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Mozilla released an update to Firefox 3 on Tuesday that patches 12 security vulnerabilities, four of which it rated as critical.

Firefox 3.0.9, the Web browser's third update this year, fixes two critical vulnerabilities in the Firefox browser engine and two in its JavaScript engine, according to a security advisory posted Tuesday:

Mozilla developers identified and fixed several stability bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these crashes ...

Continue reading ...
 

Windows 7 security enhancements

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Windows 7 makes remote connectivity to corporate networks seamless, protects data on thumb drives, and offers fewer user account control prompts to bug users compared to Vista, Microsoft said on Monday.

The software giant began an education blitz about the security features of the newest version of its operating system at the start of the RSA 2009 security conference.

Windows 7, which was released in public beta in January, will have 29 percent fewer user account control (UAC) prompts ...


Continue reading ...
 

SMS messages could be used to hijack a phone

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Be careful who you give your mobile phone number out to. An attacker with the right toolkits and skill could hijack your phone remotely just by sending SMS messages to it, according to mobile security firm Trust Digital.

In the Trust Digital demo on YouTube, an attacker sends an SMS message to the victim phone (on the left) which opens up a Web browser and downloads an executable file that directs it to send an SMS to the attacker's phone (on the right).

(Credit: Trust Digital)

In what it ...


Continue reading ...
 

Symantec acquires Mi5, expands security offerings

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

SAN FRANCISCO--Symantec has acquired Web security firm Mi5 Networks and plans to announce two new security suites at the RSA security conference on Tuesday.

Mi5 sells a Web security appliance that protects corporations against Web-based threats. Symantec will integrate the technology into its offerings later in 2009 and offer it as a stand-alone product, Joan Fazio, director of product marketing for Symantec Endpoint Security, said in an interview.

The all-cash transaction was completed ...


Continue reading ...
 

Secure software? Experts say it's no longer a pipedream

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

With the Conficker worm still hot and Microsoft patching multiple software vulnerabilities last week, it might be reasonable to assume the bad guys are winning the battle to get control over Internet-connected computers.

That's not necessarily the case. Developers are increasingly equipped with tools to shore up their products and vendors are collaborating in unprecedented ways to not only close holes in software, but also make sure they aren't in there in the first place, according to se...


Continue reading ...
 

Cybersecurity review done, heads to Obama soon

Posted by Oyya-Info on Monday, June 15, 2009, In : Politics and Law 

President Barack Obama will soon receive the results of a 60-day review of cybersecurity that should weigh in on whether he should name a cybersecurity czar, the White House said on Friday.

The review could also make recommendations on how much should be budgeted to prevent potential hacker attacks on critical infrastructure and fight widespread Internet fraud.

"Today, the interagency group undertaking the review concluded its work and is now in the process of submitting its findings and ...


Continue reading ...
 

Gmail now knows who you want to e-mail

Posted by Oyya-Info on Monday, June 15, 2009, In : TechNews 

Google's Gmail Labshas just rolled out a useful, but mildly creepy feature that gives you suggestions on who you should e-mail based on previous conversations. So, if you've had threads going with a group of people, it will recommend some of those folks once you've added at least two addresses in the recipients field. Best part is, they don't even have to be in a group of contacts you've created in Gmail's contacts manager.

I got this to work to an almost uncanny level. It handles things li...


Continue reading ...
 

Teen gets job and spreads another Twitter worm

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

The teenager who created the worms that hit Twitter earlier this week has been hired by a Web application development firm and on Friday released a fifth worm on the microblogging site.

Twitter fought off four waves of worm attacks last weekend and into Monday in which Twitter users were infected just by clicking on the name or image of someone whose account was infected. The worms appeared to do no damage other than spread to infected users' followers and modify profile pages.

Michael...


Continue reading ...
 

Ubuntu 9.04's final test version released

Posted by Oyya-Info on Monday, June 15, 2009, In : Business Tech 

The Ubuntu project has published a release candidate, or final testing version, for the upcoming 9.04 version of its popular Linux distribution.

"We consider this release candidate to be complete, stable and suitable for testing by any user," Ubuntu developer Steve Langasek said late Thursday in an e-mail.

When release candidates prove stable, they sometimes end up being final production versions, although Ubuntu 9.04 still has a small number of bugs to be fixed. The software, nicknamed J...


Continue reading ...
 

FBI spyware used to nab hackers, extortionists

Posted by Oyya-Info on Monday, June 15, 2009, In : Politics and Law 

The FBI has used a secret form of spyware in a series of investigations designed to nab extortionists, database-deleting hackers, child molesters, and hitmen, according to documents obtained by CNET News.

One suspect used Microsoft's Hotmail to send bomb and anthrax threats to an undercover government investigator; another demanded a payment of $10,000 a month to stop cutting cables; a third was an alleged European hitman who was soliciting for business from a Hushmail.com account.

CNET ...


Continue reading ...
 

eBay buying out Gmarket, as Yahoo exits

Posted by Oyya-Info on Monday, June 15, 2009, In : Business Tech 

eBay announced an agreement Wednesday to acquire Gmarket for a price of up to $1.2 billion, and Yahoo has agreed to sell its 10 percent stake in the South Korean e-commerce site in a move that would raise about $120 million.

Gmarket's board unanimously approved eBay's tender offer, in which the online auction and commerce site will pay a cash price of 31,767 Korean won, or $24, per share for all common shares and all American Depository Shares. eBay said it's assured of owning at least 67 ...


Continue reading ...
 

Google tech tweak reveals plan for faster search

Posted by Oyya-Info on Monday, June 15, 2009, In : Google 
It was the kind of detail that only experts in Web traffic analysis could love, but a technical change Google is making turns out to reveal something a lot more people care about: faster search results.

Specifically, Google is trying out a new way to present search results that uses the JavaScript programming language and the related Ajax interface technology, not just regular HTML, to display the information, Google spokesman Eitan Bencuya said.

The reason: with the Ajax-enhanced search res...


Continue reading ...
 

Obama eases restrictions on U.S. telecom firms in Cuba

Posted by Oyya-Info on Monday, June 15, 2009, In : Politics and Law 
In a move to reach out the Cuban people, the White House on Monday announced a series of changes to U.S. policy toward Cuba, including the authorization of greater telecommunications links to the communist country.

"This will increase the means through which Cubans on the island can communicate with each other and with persons outside of Cuba," the White House said in a statement. "Cuban American connections to family in Cuba are not only a basic right in humanitarian terms, but also our best ...

Continue reading ...
 

Algorithms everywhere: Can IBM automate decisions?

Posted by Oyya-Info on Monday, June 15, 2009, In : TechNews 

IBM is outlining a vision--and of course a new services unit to go with it--that takes a little time to grok.

Big Blue speaks about the "information journey," about fact-based enterprises, and about nudging out gut calls in everyday management for decisions based on hard, cold facts. When you boil it all down, Big Blue is talking about providing a bag of algorithms that will automate many of your business decisions.

Sitting through IBM's series of presentations on Tuesday about how we'll...


Continue reading ...
 

Microsoft to offer hosted security for Exchange

Posted by Oyya-Info on Monday, June 15, 2009, In : Microsoft 
Microsoft will begin offering its first hosted security service under the Forefront brand on Thursday, dubbed Forefront Online Security for Exchange and designed to help keep malware and spam out of e-mail in-boxes.

The hosted service, which will cost $20 per user per year or less based on volume licensing, targets enterprise Exchange customers and includes a Web-based console for setting up policies for virus and spam protection, said Doug Leland, general manager of Microsoft's Identity and S...

Continue reading ...
 

Google opens update software to scrutiny

Posted by Oyya-Info on Monday, June 15, 2009, In : Google 
In an attempt to better show what its software is up to, Google has released the source code of its Google Update software, a project code-named Omaha that can automatically install new versions of programs, including the Chrome browser and Google Earth.

"Some users can be surprised to find this program running, and at Google, we don't like disappointing our users. We've been working hard to address these concerns, and releasing the source code for Omaha is our attempt to make the purpose of G...

Continue reading ...
 

Yahoo shares up on news of Microsoft ad deal talks

Posted by Oyya-Info on Monday, June 15, 2009, In : TechNews 

Yahoo shares rose in intraday trading Monday on reports that the company is in preliminary talks for an advertising partnership with Microsoft.

Yahoo's stock was up as much as 7.6 percent to $14.49 in early morning trading, a level it hasn't seen since early October. Yahoo's gains also went against the tide of the broader markets, which were down in morning trading.

The bump in Yahoo's share price follows reports on Friday that the Internet search pioneer has had discussions with Micro...


Continue reading ...
 

Twitter cleans up after weekend worm attacks

Posted by Oyya-Info on Monday, June 15, 2009, In : TechNews 
Twitter security engineers were cleaning up on Monday following a series of worm attacks over the weekend, including at least two credited to a bored 17-year-old.

In the first attack, which began early on Saturday, four new accounts began spreading a worm, compromising about 90 accounts, Twitter co-founder Biz Stone wrote in a posting on the Twitter blog.

The worms appeared to do no damage other than spread to infected users' followers and modify profile pages. You can get infected just by clic...

Continue reading ...
 

Adobe makes Acrobat.com a business with paid accounts

Posted by Oyya-Info on Monday, June 15, 2009, In : Webware 

Adobe is taking Acrobat.com out of beta on Monday, and turning it into a business with paid user accounts. The service, which has more than 5 million registered users will retain its free version, however there are now usage limitations on certain features which can be unlocked by upgrading to one of the two new premium plans. These can be purchased on a monthly or yearly basis and cost $14.99 or $39 a month, or $149 or $390 a year respectively.

The "premium basic" plan allows for 10 PDF conv...


Continue reading ...
 

Conficker also installs fake antivirus software

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Researchers have discovered another feature of the Conficker worm that provides an additional clue about the intent of the creators--the worm installs malware that masquerades as antivirus software, Trend Micro

said on Friday.

The worm, which has infected millions of Windows-based computers on the Internet, is downloading a program called Spyware Protect 2009 and displaying warning messages saying that the computer is infected and offering to clean it up for $49.95, according to the Trend ...


Continue reading ...
 
 



Best Communitation Website
Which communication website is best?

Myspace
Facebook
Twitter
Furry-paws
Youtube


Make a free website with Yola