Busy Week For E-Discovery
Three new product releases aimed at the electronic discovery market close out the last week of summer.
Linux Systems Being Hit By SSH-Key Attacks
The attack appears to rely on stolen SSH keys to gain access to a system and then uses a local kernel exploit to gain root access, whereupon it installs the "phalanx2" rootkit.
iPhone Password Flaw Discovered
Once the emergency call keypad is accessed through the passcode entry screen, a person only needs to double tap the home button.
Nations Respond To Google Earth Threat
From banning Google Earth to simply ignoring the mapping service, countries are working to deal with potential security violations arising from the images Google makes available online.
Any Extra Change Jingling In Your Pocket Lately?
Tech salaries inched up recently after slumping earlier this year, according to a new wage report from an IT services and staffing firm. Could this the beginning of an upward trend or just a blip?
Getting A Perspective On Man In Middle Attacks
Researchers at Carnegie Mellon University have proposed a system whereby you can ensure that when you attach to a server that uses SSH or a self-signed digital certificate and you haven't verified the authenticity of the host identity beforehand, you aren't subject to a man in the middle attack.
Embarq To Trim 4% Of Workforce
The former Sprint landline operator will confront its declining customer base by dropping 1,000 company and contract positions.
Untrusted SSL Certificates Indicate A Failure
An unknown certificate is a failure in SSL/TLS, and that's how it should be. Ever since Firefox 3 came out, the way it presents SSL-enabled Web sites with self-signed certificates has been called scary and hurtful. Untrusted self-signed certificates should be scary because untrusted self-signed certificates are a failure in SSL/TLS, and a failure in your authen
Security Worries Trump Cost Cutting And Customer Service
Despite the tight economy, belt tightening is not top of mind for midsize businesses. Rather, security is what's keeping IT decision makers awake at night. And, few of them are happy about how their company is using IT to achieve business goals.
Apple Sued Over iPhone 3G Reception Problems
An Alabama woman alleges that the handset isn't as fast as advertised, and she's seeking class-action status to represent other customers affected by the "defective" iPhone 3G.
Wind Turbine Success Story At Jiminy Peak
One year after coming on line, a $3.9 million wind turbine is generating a third of a Massachusetts ski resort's power. See images of how the turbine was installed.
Google Wants The Airwaves
The Free The Airwaves campaign is rallying support to open unused TV spectrum, called white space, to carry high-speed wireless Internet signals.
Common-Sense Cybersecurity Recommendations For Our Next President
Our next president is going to have a big job securing our nation's IT against criminals and foreign enemies. Our data networks are an important part of the national infrastructure -- and therefore tempting military targets -- along with traditional infrastructure such as dams, power plants, factories, and hospitals. Security expert Bruce Schneier has some short, sensible advice for what the next president will need to do.
|