4.2 Million Credit Cards Leaked
A New England-based supermarket, Hannaford Bros., said Monday that a system breach may have given criminals access to more than 4 million credit and debit cards. It's a significant event, and while the facts aren't out yet, it looks unlike most other breaches.
Information Is Power
Government officials' seeming inability to manage information has led me to conclude they don't need a backup and archiving policy so much as they need a virtual Roto-Rooter turned on their servers and tape drives and cardboard boxes. And here are three cases in point.
P2P Points To Plenty Of Business Problems
Turns out the problems with peer-to-peer file-sharing goes way beyond piracy. A new investigative piece indicates that there's plenty of business and personal data afloat on P2P networks.
Worth Watching
Back when I covered storage networking a lot more closely, I learned to anticipate the industry's rhythms. If any one of EMC, HP, IBM, or NetApp introduced something, one of the other three would frequently contact me on the QT to let me know why their solution was still superior.
T.J. Maxx To Hold 'We Got Hacked' Sale
As part of class-action settlement for one of the most egregious breaches of consumer credit cards in U.S. history, T.J. Maxx plans to hold a special one-day sales event. Seriously?
Trend Micro Anti-Virus Site Hacked
If the anti-virus makers can't keep their sites safe, how safe are the rest of us? That's one of the questions raised by a hack of Trend Micro earlier this week.
What Sticks
And what doesn't in the startup world doesn't appear to have much to do with technology. Like in sports, whoever can deliver on the fundamentals -- in this case, basic business fundamentals, stands a better chance of thriving in the market.
Hacking WiFi
Here's an evil twin that can seriously alter your Starbucks experience
Developers: Check Your %*^& Inputs
Better watch where you click, you just may be stepping into a Web page with a Trojan horse, according to security researcher Dancho Danchev.
This warning brought to you by the fact that developers continue to neglect to check their application -- and in this case, search engine -- inputs.
I Smell A Reality Show
Geeky? Unsociable? Does this sound like you? It's how the European Union's top technology official summed up the current lot holding down jobs in IT. Her prescription for change isn't likely to win her tons of support, either.
Economic Spin
While we contemplate the wisdom of locking Eliot Spitzer and Geraldine Ferraro in a room together for all eternity, let's take a deep breath and give thanks for some positive economic news (Go, Dow, go) and wonder what in the world they're smoking over at the freshly renamed NetApp.
Malware Made Real
Romanian visual artist Alex Dragulescu has created a series of images depicting malware, under a commission from MessageLabs, a communications security company. The results are stunning because they sustain the expectation that malicious code is somehow alive.

Disaster Recovery: Practice = Protection
How prepared can you be for a data disaster? Clearly the answer is never enough -- no matter how prepared you are, the recovery will undoubtedly reveal aspects of your preparation that can be improved upon. So why not start scouting out those improvable aspects before disaster strikes? Why not practice for problems and rehearse your recovery? Doing so now might eliminate post-disaster disasters later.
FTP Hacking on the Rise
First it was stolen FTP server admin privileges. Now it's spam messages with bot-infected FTP links
Skepticism and Safety
Welcome to the Internet. Trust no one.
Living in my bubble of tech-savvy friends and acquaintances, it's easy for me to forget that people need to be told this. But then, I get an e-mail from a particular person (who shall remain nameless) warning me about a virus going around in the form of an e-mail attachment entitled "Life is Beautiful." Of course, it's a forward, and I can see the chain of suckers going back several generations. I'm admonished not to op
Demise Of The Specialist
Security's never been an afterthought in storage, but it wasn't exactly a major cornerstone as stored bytes moved beyond the mainframe and into storage networks. Lost or stolen hard drives, laptops, and backup tapes have made big headlines in recent years, and prompted state and federal lawmakers to horn in on the act.
|