Archive

How to Soup Up Your Home WiFi With Multiple Repeaters and Access Points

Does flaky Internet connectivity have you scrounging for solutions? The COVID-19 pandemic increased our demand for Internet service due to working from home, online learning for kids, and video conferencing with colleagues and family members. For many people stuck at home, Internet connectivity issu...

TECHNOLOGY LAW CORNER

FTC’s Lawsuit Should Make You Feel Very Insecure About the IoT

Even though D-Link expressly promised that many of its wireless devices had the highest level of security available, the Federal Trade Commission last month filed a lawsuit that alleges otherwise. The FTC filing includes copies of online marketing materials and technical specifications for D-Link's ...

GOVERNMENT IT REPORT

Cybersecurity Goals to Guide Federal Software Spending

The U.S. government is on track to significantly boost spending on cybersecurity solutions. However, evolving requirements to greatly improve federal protection of information technology resources will shape that spending. In fact, federal cyberprotection goals should be augmented and significantly ...

40 Million Target Customers Fall Prey to Hackers

Target has disclosed that 40 million customer accounts might have been accessed by hackers between Nov. 27 and Dec. 15. Customer names, credit and debit card numbers, card expiration dates and the three-digit security codes on the backs of cards were compromised when they were swiped through machine...

GOVERNMENT IT REPORT

Federal IT Spending Cautiously Creeps Upward

As Washington hunkers down for an era of tight federal budgets, information technology vendors can take some comfort in a projected modest rate of growth in federal IT investments. Between 2011 and 2016, federal spending for IT should grow by 12 percent, in total, for an average compound annual rate...

PODCAST

Which IT Skills Are Pulling Big Bucks?

David Foote is CEO and chief research officer, as well as cofounder, at Foote Partners of Vero Beach, Fla. David closely tracks the hiring and human resources trends across the IT landscape. He'll share his findings of where the recession has taken IT hiring and where the recovery will shape up. We'...

Is AES Encryption Crackable?

In the field of computer technology, some topics are so frequently and fiercely disputed that they almost resemble religious feuds -- Mac vs. PC, for instance, or open source vs. proprietary software. Other topics, though, don't see nearly the same level of high-profile debate. Take the invulnerabil...

The Never-Ending Struggle for Malware Containment

The IT security front is like any war: Secure one battle line and a breach may occur on another. Red flags about malware have become almost a daily occurrence in the virtual world, and the malware lexicon has mushroomed in recent years. Terms like "zombie," "rootkit," "worm," "Trojan," "spyware," "b...

OPINION

Living in Digital Hell

I'm an early adopter. I don't just analyze technology from the safety of my own cubicle; I bring it into my home and live with it. I find that by doing so, I gain a perspective that would otherwise be lost. About a year ago, I disconnected my traditional landline phone and signed up for VoIP service...

PRODUCT REVIEW

Patrolling Network Security With NetTrooper

Like many home keyboard jockeys, I view my wireless network as a black box. I set it up to share my broadband Internet connection. It does that. So I leave well enough alone. That doesn't mean, though, that my curiosity isn't aroused from time to time, and I feel an urge to poke around with the netw...

SOFTWARE

Evil Twins a Menace to Wireless Security

Wireless Fidelity (WiFi) connections to the Internet provide business and personal users with near limitless computing convenience. However, unprotected wireless connections can be more damaging to corporate network security and user privacy than always-on cable connections without firewalls. Securi...

SOFTWARE

Free Wireless Software Provides Entry-Level Security

Mike Klein, CEO of network security firm Interlink Networks, knows a good marketing tactic when he sees one. When Zone Labs started giving away no-nonsense firewall protection as a free download, he was paying attention. "They did it well!" Klein told TechNewsWorld. "We based our free WiFi protectio...

WiFi Users Should Beware ‘Evil Twins’

Wireless access to the Internet through WiFi hot spots is widening to include more public places, but users of the often free wireless networks are being warned that security risks are also growing. The most recent cautionary advice came from UK researchers at Cranfield University who indicated "evi...

Companies Scrambling To Meet SOX Deadline Today

Today is the federally mandated deadline for investment companies and other publicly owned firms to be in compliance with internal auditing controls stipulated by the Sarbanes-Oxley (SOX) Act of 2004. However, it appears many companies might miss the deadline. Under terms of the SOX law, otherwise k...

How often do you receive an email that you suspect is fraudulent?
Loading ... Loading ...

LinuxInsider Channels