Archive

SPOTLIGHT ON SECURITY

Defeating Malware With Its Own DNA

It's widely known that human DNA evidence has had a major impact in the criminal justice system. Now another kind of DNA may have a similar impact in the fight to eradicate malicious software. Malware DNA, also known as "malware provenance," is the art and science of attributing elements of one obj...

Google Turns Hangouts Into Office Space

Google on Monday introduced a new social media feature called Helpouts, a real-time channel that's designed to let businesses and individuals give and get help over live video. Powered by Google's Hangouts video chat platform, Helpouts can be used to offer instruction in a wide range of areas, from ...

TECH TREK

Bad Apple: China Investigating Alleged Supplier Pollution

In what amounts to a serious environmental breach or a continuation of China's anti-Apple PR blitz -- or both -- Chinese regulators are scrutinizing a pair of Apple suppliers in China over pollution allegations. The factories in question, located in Kunshan, an electronics manufacturing hotbed about...

TECH TREK

China Bashes Apple for Tax Evasion

China has been having a good go at Apple lately, having slammed the company in March for substandard post-sale service and quickly following that up with charges of copyright infringement. The latest accusation: tax evasion. Oh, and pornography. Apple's online stores in China are not paying proper i...

TECH TREK

Chinese New Year Inspires Line-Cutting Apps

It is known, rightfully so, as the largest annual migration on Earth -- and the ticket lines, even on the Web, are accordingly long. But there's an app for that -- a few of them, actually. The Lunar New Year, also called the "Spring Festival," has inspired apps that allow people to cut in line, so t...

SPOTLIGHT ON SECURITY

What Evil Lurks in the Hearts of Hactivists?

Nearly two-thirds (64 percent) of IT pros believe their organizations will be the target of a cyberattack in the next six months, and three out of five (61 percent) say the attack will come from hactivists. That was one of the findings in cybersecurity firm Bit9's annual security survey released las...

TECH TREK

Netflix Doubles Down on European Gambit

Earnings report be damned, Netflix has vowed to grow its European operations in the fourth quarter of this year. On the same day that it revealed a quarterly loss of $5 million, Netflix said that it would press on with its expansion efforts in an attempt to bolster revenue. In its first quarter earn...

SPOTLIGHT ON SECURITY

Malware in the Office, in the Sky and on the Phone

October is National Cybersecurity Awareness Month, according to the U.S. Department of Homeland Security, and various federal agencies are ringing it in with a couple of slaps to the head and a kick or two to the shins. First, the Government Accountability Office issued a report that stated 24 major...

Kiss This: Scientists Show Off a Cyber-Smooching Machine

Researchers in Japan are working on a device that has managed to intrigue -- or at least amuse -- public relations executives, social scientists and even the patent holders of a sanitizer for computer keyboards and other peripherals: an Internet-based kissing machine. Yes. A work in progress by Kaji...

Microsoft Offers Bounty for Capture of Conficker Creators

After weeks of combating the relentless spread of the Conficker worm -- also known as "Downadup" -- Microsoft announced a $250,000 bounty for information leading to the arrest and conviction of the hackers behind the troublesome malware. In addition to posting the reward, Microsoft revealed Thursday...

OPINION

Major Media Ignore Science, Tech at Own Risk

Here are just a handful of the big stories that CNN and other news organizations won't be able to fully cover over the next two to three years: An economic rebound spurred by renewed investments and new developments in technology. An Internet available to more people in more far-flung parts of the U...

E-Mailers Beware: Phishers Never Sleep

Can you recall the five worst phishing scams to grace your e-mail in-box? Can you spot a genuine e-mail from your financial institution or government agency? Don't feel too technologically challenged if your answer is no to either -- or both -- of these questions. Even security experts are hard-pres...

Meet the New Bad Guys: Hired Guns, Zero-Minutes and Malware 2.0

Other than perhaps the medical and legal industries, no field relies on jargon more than computer technology. Take, for instance, the use of words borrowed from other lexicons -- terms such as "virus, "Trojan," "intrusion prevention system," "spyware," and "attack vector." You might well hear these...

New Worm Masquerades as IE7 Beta Download

It always pays to be suspicious when unsolicited e-mails arrive, and on Friday new evidence underscored the point: A malicious e-mail purportedly from Microsoft actually serves up a worm dubbed "Grum." The e-mail, which claims to come from [email protected] and reads "Internet Explorer 7 Downloads...

Elon Musk's Dec. 2 action to release The Twitter Files: Approve or Disapprove?
Loading ... Loading ...

LinuxInsider Channels