Archive

Security Wonks Find Gaping Hole in Trusted Site System

An international group of independent security researchers announced Tuesday that they have found a significant weakness in the Internet digital certificate infrastructure used by many Internet businesses. The flaw could conceivably allow cybercriminals to create fake certificates that would then be...

Are Banks Short-Changing You on Security?

Given the financial fallout we've all been treated to this year, online banking and investment transactions may face increasing risks from hackers and sub-par network security. Buying and selling via the Internet is the most common form of trading stock -- and the most vulnerable. With so much mone...

LINUX BLOG SAFARI

On Holidays, Hot Air and the 7 Horrors of Linux

Well, the holiday season is upon us once again, and that means it's the beginning of what, for many geeks, is a time of unnatural, enforced, repeated and prolonged socialization. Yes, it can be an uncomfortable time for those of us who aren't perky, extroverted cheerleader-types, and we here at Linu...

OPINION

Bond Goes Commercial: Quirky Gadgets Out, Product Placements In

The history of James Bond films is the history of our fascination with technology: booby-trapped briefcases, jetpacks, cars with machine guns and ejector seats, super-magnet watches, cars driven by remote control, acid-filled fountain pens, cars that become invisible, sharks with frickin' lasers...

LINUX BLOG SAFARI

Who’s the Greatest Geek of All Time?

Mirror, mirror, on the wall, who are the greatest geeks of us all? That question -- posed in an Australian iTnews article, "The Top 10 Greatest Geeks of All Time" on Monday -- sparked quite a discussion in the blogosphere last week, garnering more than 1,300 Diggs and 280 comments by Friday. Who was...

Army Intelligence Wonks Discover Twitter

The scenarios jump right out of a Brad Thor or Vince Flynn technothriller novel: Terrorists, using the microblogging service Twitter in conjunction with Google Maps, cell phone video and global positioning system technology, stage an ambush on troops in Iraq or coordinate an attack in an American ci...

TECH BLOG

Microsoft’s Chinese Folly

Microsoft has angered Chinese computer users with its latest antipiracy move. On Tuesday, during its Global Anti-Piracy Day, Microsoft turned Windows Genuine Advantage loose on the Chinese people. Other users worldwide are familiar with WGA, which famously labeled legitimate users as pirates and dis...

OPINION

It’s Time to Hack the Economy

The Hacker Underground is dead. Long live the Hacker Underground! In the most recent issue of Phrack Magazine, I read an article titled "The Underground Myth," that makes a number of astute points about the demise of the hacking scene of the last few decades. The author describes a technical landsca...

PODCAST

Geekonomics Author David Rice: ‘They’re Not Trying to Make Bad Software’

"Geekonomics is really about the economics of a technology ... and the positive and negative impact on us." That's according to David Rice, author of "Geekonomics: The Real Cost of Insecure Software." In his book, Rice discusses how software defects severely impact the U.S. economy and national secu...

EXPERT ADVICE

Building a Better Password

Two weeks ago, Republican vice presidential nominee Sarah Palin discovered that a hacker had gained access to her personal e-mail account and posted some of its contents -- both letters and photos -- on a Web site viewable by the public. The incident underscores the importance for anyone with secure...

ANALYSIS

New PCI Security Standard Falls Short

October is the expected release date for the next version of the PCI Data Security Standard, 1.2. Since the PCI Standard's creation -- to serve as a guideline to help organizations that process card payments, prevent credit card fraud, hacking and various other security vulnerabilities and threats -...

PODCAST

Ninja Assassins, E-Mail Hackers and a Digital Media Pile-On

If you're a ninja assassin, a terrorist, an illegal street racer, or any other variety of violent outlaw, you shouldn't look to YouTube for training anymore; you won't find any there. The Google-owned video sharing site has revised its policies to specifically forbid videos that offer instructions o...

EXPERT ADVICE

Software, Trust and Democracy

Software is an integral part of everything we do now -- drive a car, make a phone call, turn on the TV, get on an airplane and, yes, exercise your franchise. Is this the same software that just crashed my new cell phone or sent my credit card number off to a hacker in Eastern Europe? Well, not exact...

What Palin’s Hacked E-Mail Reveals: System Insecurity

Alaska Governor and vice presidential candidate Sarah Palin received a harsh lesson in the relative security, or rather lack thereof, of commercial e-mail accounts Wednesday. The GOP hopeful for VP discovered her personal Yahoo e-mail account, on which she allegedly conducted official state business...

IBM Hones New Blade Server to Repel DoS Attacks

IBM is increasing its arsenal against hackers with a new beefed-up blade server. The IBM BladeCenter PN41, announced this week, combines Deep Packet Inspection technology from CloudShield with IBM's other protection platforms to create a powerhouse against attacks. The system is designed specificall...

How often do you receive an email that you suspect is fraudulent?
Loading ... Loading ...

LinuxInsider Channels