XP Service Pack Delay: What Else Is New?
Microsoft's on-again/off-again extension of support for XP may or may not be on-again, but the latest delay of the latest long-awaited XP Service Pack delay may strike some of us as the last straw.
Will Code Viruses For Beer
A controversial contest at this year's Defcon hacker conference promises to reward the most successful virus writers.
Windows XP Service Pack 3
While there's not a lot of big news or fanfare surrounding the imminent release of Windows XP Service Pack 3, there are a number of interesting security enhancements.
Quick! Unplug Your Internet Connection!
According to the security vendor Sophos, one Web page is infected with malicious software every five seconds. Yeah, but it's probably mom-and-pop and porn Web sites with all of the infections, you say. Think again.
Focus On Managing Risk, Not Gruntwork
With large enterprises sporting hundreds of applications, firewalls, routers, and other networking devices -- and more than 139 newly announced vulnerabilities each week -- how do they know what vulnerabilities actually matter?
Are EMC And IBM Reliable Storage Bellwethers?
Their success is no guarantee of success for other vendors, but dismal results from these two companies would augur poorly for the rest of the storage industry, to say the least. And quite apart from my glass half-empty outlook, I'm not sure how much weight to give the recent positive financial performance from EMC and IBM.
New Malware Page Every Five Seconds: Sophos
Sophos released its Q1 2008 threat report today, and the news ain't good. In fact, it's three times as bad as last year -- that's how fast the threats are increasing. And increasing every five seconds.
Crank Up The Volume
If storage were an audio receiver, we'd be flirting with that "9" or "10" mark on that big black dial. But we're talking capacity here (and maybe speed), as vendors appear to bend the rules of physics by cramming more bytes than any space or drive should be able to accommodate.
Ooops -- Microsoft Nags More Office Users Than It Meant To
Microsoft's latest attempt to track down illegitimate copies of its programs -- in this case Office -- went a bit (and way more than a bit) farther than the company intended last week when it released an Office piracy detector worldwide, instead of to the four countries the program targeted.
Ever Lose A Smartphone?
I've lost a number of them, and each time I've left behind a smartphone or PDA, I've worried not so much about the device -- but the personal data it holds. Kaspersky Lab is offering what could be a viable solution.
Sweets For The Cheats: Like Passwords For Chocolate
It's silly -- and sexist -- season again, as a European security conference lets us know, as it does every year, just how easy it is to acquire passwords from workers. Namely, how many passwords can you get in exchange for a bit of chocolate?
What Are Your Employees Doing on the Road?
Trust can be a trait that takes long time to develop but can be quickly broken. If your company trusts its employees to use the Internet judiciously on the road, then it may be time to rethink that position.
When You Spring A Wikileak
When thinkers of big thoughts talk about the democratizing effect of technology, they needn't look a whole lot further than Wikileaks or LiveLeak. Incendiary anti-Muslim video, copies of documents from Guantanamo -- this stuff leaves the Huffington Post and other Web 2.0 "news" sites in the dust.
CEO Spam Scam: Phishing For Big Fish
A new targeted spam campaign uses fake federal subpoenas to trick CEOs into clicking on a malware link. One source indicates that 15-20,000 spams went out. And amazingly, about 10 percent of the recipients responded!
Data in Motion, And At Rest
As an IT professional, which one worries you more? And what do you do about a technology like RFID that splits the difference between those two conditions -- stationary, yet traveling across the airwaves, and god knows where else?
E-Ignorance Can Be Bliss
I missed something that was staring me in the face. It wasn't something huge or important, like, "Oh, look, Hillary Clinton's really trying to be nice this week." No, what I happily missed were online ads served up by Evite alongside the "Come to dinner" verbiage. This offense apparently is enough for the New York Times to proclaim the site as the ruination of parties in our modern e-times. But what if we forget
Spoofing WiFi Positioning (and the Boss)
The boss wants it both ways. On one hand, she doesn't like me hanging around the office, disrupting a normal, pleasant working environment. On the other hand, she wants to know where I am at all times -- right, like I'm going to tell.
The Temperature Of Storage
Why can't I look away from the morning weather report, or just turn the page when I come across the odds-makers' lines on the sports section? Maybe it's the control freak in me. Or that I want to believe some mere mortal really knows how this will all turn out. Maybe I just want information, even if it's deemed reliable but not guaranteed.
I try to remember all this as I read the temperature taking going on in the storage industry, against a backdrop of bankruptcies, foreclosures, and r
Al Gore's Top Secret Speech At RSA
If any RSA Conference attendee wants to loan me his or her RSA badge on Friday afternoon for about an hour, send me an e-mail.
I was planning to attend Al Gore's keynote on emerging green technologies that day from 2:15 PM to 3:00 PM, but it turns out that members of the media aren't going to be allowed in.
Evidently, Gore will be discussing the ingredients in
Why Did EMC Buy Iomega?
By now you've read the news reports that EMC bought Iomega for $213 million. I can't help but wonder what they got that was worth it. Back in the days when 100 MB Zip disks were the easiest way to move more than a floppy's load of data from one place to another, Iomega was a force to be reckoned with. Today it sells USB hard drives, low-end NAS boxes running Windows Storage Server, and the REV removable media hard drive. Why would EMC, king of the services sale, want to enter the low-margin con
The Cybercrime Economy
Dot-coms daunted by the financial downturn would be well advised to look to the cybercrime economy.
Cybercriminals "have very sound business models," said Joe St Sauver, manager of Internet2 Security Programs through the University of Oregon at an RSA Conference panel on Wednesday, "better than many corporate business plans I routinely see."
Wheeling And Dealing
With the RSA conference on the West Coast competing with Storage Networking World in Orlando, Fla., this week, there are just a couple of vendors big enough to straddle both realms. Any guesses? Both have figured prominently in the tech headlines in the last 48 hours.
Locking Down Stolen Laptops About to Become Simpler
Mobility offers small and medium businesses a way to improve productivity. One downside is the difficulty in protecting sensitive information if a laptop computer is stolen or --more likely-- left behind as executives scurry from place to place.
|