Keyword: computersecurityin
-
<p>WASHINGTON (AP) -- A House bill that could give life imprisonment to some computer hackers received support from administration officials and technology executives Tuesday.</p>
<p>Microsoft lawyer Susan Kelley Koeppen, a former Justice Department prosecutor, said courts should take hackers more seriously.</p>
-
<p>WASHINGTON (AP) -- A new security flaw that affects network devices made by hundreds of different companies could threaten the well-being of the Internet, a government-funded research group warned Tuesday.</p>
<p>The problem is most serious for Internet service providers, which use systems called routers to manage the flow of messages across computer networks and the Internet, security experts said. The hole could let malicious hackers shut down or take control of those routers.</p>
-
CERT® Advisory CA-2002-03 Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP) Original release date: February 12, 2002 Last revised: February 12, 2002 (16:57 EST) Source: CERT/CC A complete revision history can be found at the end of this file. Systems Affected Products from a very wide variety of vendors may be affected. See Vendor Information for details from vendors who have provided feedback for this advisory. In addition to the vendors who provided feedback for this advisory, a list of vendors whom CERT/CC contacted regarding these problems is available from http://www.kb.cert.org/vuls/id/854306 http://www.kb.cert.org/vuls/id/107186 Many ...
-
MS server bugs open the door to hackers MS server bugs open the door to hackers Mon Feb 11, 4:43 PM ET By Matthew Broersma, ZDNet News Microsoft has warned of vulnerabilities in its Exchange 2000 server software and Telnet remote-access service that could open the doors to malicious hackers. •Special FREE Software•Beginner's Guide to MP3•Software Quick Start Guides for Beginners • Tech News on Your PDA • Land a Hot Tech Job • ZDNet Tech Update • Free Downloads • Online Classes • Most Popular Products Sign up for the free ZDNet News Dispatch: (CNet/ZDNet Privacy Policy) ...
-
Microsoft Recalls Botched Browser Security Patch Package was to fix 'all known security flaws in Internet Explorer.' By Brian McWilliams, Newsbytes Feb 11 2002 12:15AM PT A collection of long-awaited security patches designed to plug several critical holes in Internet Explorer was yanked from Microsoft's site Thursday after the company found problems with the fix. Approximately two hours after the cumulative patch for IE was loaded to the company's Windows Update site Thursday, Microsoft "discovered an error and halted the distribution process in order to conduct further testing," according to a Microsoft representative. The company did not say how many ...
-
BILL GATES SAYS security is Microsoft's top priority, but just whose security does he have in mind? Consider some of Microsoft's recent boilerplate legalese -- language you or your company might already have unknowingly accepted -- and then decide for yourself. The language is contained in the Product Use Rights (PUR) document that can be found at www.microsoft.com/licensing/resources. As the PUR document is part of most customers' volume license agreements and is subject to periodic change, in theory Microsoft customers should check it regularly to see what rights Microsoft has decided to grant or take away. You can be forgiven ...
-
Hole Found in Net Security Program Fri Feb 8, 6:45 PM ET By D. IAN HOPPER, AP Technology Writer WASHINGTON - A programming mistake in a popular consumer Internet protection program can give hackers control over a user's computer, the publisher disclosed Friday. All current versions of BlackICE Defender and BlackICE Agent, both made by Atlanta-based Internet Security Systems, running on Microsoft Windows 2000 (news - web sites) and Windows XP (news - web sites) are vulnerable to the attack. The company released an update Friday evening that plugs the hole. It can be downloaded through the ISS Web ...
-
Making a phone call has always been a game of chance. You never know whether the person you are calling is available. You just punch in the numbers and hope to get lucky. Imagine being able to learn without dialing a single digit whether another person's phone is in use, or in the case of a cellphone, whether it is even turned on. Now imagine being able to do the same thing with any wired or wireless device of the future whether it is in the car, in an airplane or at the gym. Not only could you learn ...
-
A U.K. security expert is preparing to unveil a trove of serious vulnerabilities in Oracle's database products. Can the company redefine 'unbreakable' in time? An Oracle advertisement emailed last week to InfoWorld subscribers typifies the software company's newest marketing campaign. It begins with the unsettling assertion that annual computer security incidents have increased ten-fold since 1997, then lists the ways that the company's database products can defend the reader against hackers. The ad ends with a now-familiar claim, "Oracle9i. Unbreakable. Can't break it. Can't break in." That simple bold message of invulnerability has grown into something of an IT cultural ...
-
I need input regarding various platforms running WordPerfect and Word together. I am told it causes too many problems. Is it true? I need specific experiences regarding running both Word and WordPerfect on a Citrix system with Windows 2000 network. 1) Any techs familiar with Citrix? What is it? 2) Is it a hardware translator enabling the emulation of a real computer while using Mac hardware? or, 3) Is it a software enabling the translation of the MAC OS? 4) Does WordPerfect crash if run on a network utilizing Citrix with Word and a Windows 2000 network? Anyone have any ...
-
Users of Microsoft Office on the Macintosh may find that their product serial number is a tool for hackers. Microsoft issued a security warning Wednesday saying that programmers with malicious intent could use Mac Office v. X's product identifier to shut down one or more copies of the application running on a network or connected to the Internet. Although the Redmond, Wash.-based software titan characterized the security threat as low, the timing and unusual nature of the problem--an exploit involving an anti-piracy mechanism--could give it another black eye. The company has taken a drubbing recently from analysts and customers ...
-
Microsoft Corp. is striking back at a growing movement seeking to switch computers in the Bundestag, Germany's lower house of Parliament, over to the open-source Linux operating system. Kurt Sibold, chairman of the board of the software giant's German subsidiary Microsoft GmbH, accused the initiators of a pro-Linux petition of smearing the reputation of his company. "What you are achieving by supporting this campaign is public discrimination, accusing our products and services of being undemocratic and an obstacle to democracy," he wrote in an open letter to signatories of the online petition, known as www.bundestux.de. The petition campaign was launched ...
-
Why I just love the new iMac (and why you might, too) David Coursey,Executive Editor, AnchorDeskMonday, February 4, 2002 It's been a week since I started using a new iMac as my full-time desktop and a PowerBook G4 as my portable PC, all as part of my month-long challenge to see if I, long a loyal Windows user, could make Apple the center of my computing universe. There are still a few problems--specifically related to getting PDA data in and out of Microsoft Office. But besides that, I've made a very smooth transition. I have even started using the ...
-
US and Israel the cyber crime kings By Chris Lee[29-01-2002] The US is the largest mass producer of cyber attacks, according to security expert Riptech, with Israel producing the most attacks per capita. In its report out today (28 Jan) Riptech, which investigated over 128,000 cyber attacks in an analysis of 5.5 billion log entries over the six months to December, found that hi-tech, financial, power and media companies were the most likely to suffer. "Once companies connect to the internet, they are virtually guaranteed to suffer some form of attack," said the report. Although most attacks were harmless, some ...
-
Is Bill Gates Sincere About Security? By Paul Desmond In the past few years, Bill Gates has used email to communicate to Microsoft employees two dramatic shifts in the company's direction. The first was when Microsoft decided the Internet was everything and the second came about two years ago, launching the .NET vision. On Jan. 15, Gates issued an email memo that marks a third landmark shift, this one an all-out effort to make security job one. I can sense the skepticism in the air, but I've seen the memo and I believe Gates really gets it. Whether he will ...
-
NEW YORK (Reuters) - International Business Machines Corp. (NYSE:IBM - news) said on Tuesday that Chief Executive Louis Gerstner, who led a massive turnaround of the once-ailing computer giant in the 1990s, will step down March 1 and be replaced by President Samuel Palmisano. Palmisano has been expected to follow in Gerstner's footsteps since being named president and chief operating officer in July of 2000. He retains his title as president. Gerstner -- who caused a storm of controversy soon after taking over in 1993 when he said he had no ``vision'' for IBM, but nonetheless led it through sweeping ...
-
LOS ANGELES, JAN 23 2002 - Heavily armed with high-powered machine guns, shotguns, and hand guns, the FBI, Secret Service, and Los Angeles Police Department surrounded the founder of raisethefist.com in his house. The founder was currently asleep, woken up by a relative who said fbi, police and undercover's were currently up and down all of the streets, with they're eyes focused on the premises. Raisethefist.com founder aproached the door were 2 FBI agents demanded that he step outside. Within seconds a swarm of FBI raided the house with automatic weapons and shot guns. Additional police and fbi also stayed ...
-
IF HACKERS CAN bring down Yahoo!, with its huge banks of huge computers in huge buildings with huge staffs, can they bring down your lonely little PC in the spare bedroom? Can they invade its contents, peering right into your kid's term paper on Christopher Columbus? And, if so, what can you do to stop them? There's no perfect answer to that question. Theoretically, any computer that connects to the Internet, even episodically, could be penetrated by malefactors. The invaders could then read or copy data on its hard disk, or plant "Trojan horse" programs you'd never find that ...
-
RealNetworks will release a patch for a security flaw in its RealPlayer 8 software that could allow a rogue site to crash the player and potentially execute malicious code. According to a company spokesperson, the patch will correct a buffer overflow bug reported to RealNetworks last week by Tim Morgan, an Oregon-based security expert. The media firm will distribute the patch to users through its automatic update service beginning Friday. The RealPlayer 8 is used by millions of Internet media fans to play a variety of audio and video file types, including proprietary formats developed by RealNetworks. The player is ...
-
Tucked away in Hillsboro, Ore., a small team of Intel engineers has been quietly working on a chip technology that the giant semiconductor maker hopes will never see the light of day. Intel's Yamhill Technology is a secret weapon against upcoming chips from rival Advanced Micro Devices. It's also a hedge against the possible failure of Intel's flashy new Itanium chips for computer servers, which have so far gotten a disappointing reception from customers and partners. Unlike the Itanium, which uses a novel design that has some difficulty running software written for Intel's well-known Pentium family of chips, new chips ...
|
|
|