Keyword: computersecurityin
-
THOSE AMERICANS WHO DO ACCESS TOP NOTCH CONTENT ONLINE ARE OFTEN STEALING IT. EVERY WEEK A MAJOR MAGAZINE OR NEWSPAPER REPORTS ON THE THOUSANDS OF ILLEGAL PIRATED WORKS THAT ARE AVAILABLE FOR COPYING AND REDISTRIBUTION ONLINE. ACADEMY AWARD WINNING MOTION PICTURES, PLATINUM RECORDS, AND EMMY AWARD WINNING TELEVISION SHOWS – ALL FOR FREE, ALL ILLEGAL. WHEN CONGRESS SITS IDLY BY IN THE FACE OF THESE ACTIVITIES, WE ESSENTIALLY SANCTION THE INTERNET AS A HAVEN FOR THIEVERY. A SOLUTION IS UNDER OUR NOSES. LEADERS IN THE CONSUMER ELECTRONICS, INFORMATION TECHNOLOGY, AND CONTENT INDUSTRIES ARE AMERICA’S BEST AND BRIGHTEST. THEY CAN SOLVE ...
-
Listening to Fox News today, I heard several times over the course of the afternoon, some brief reports that the computers controlling the power grid were being "hacked" "pinged" or tested in some way, and that this was coming from the middle east. Then, John Gibson had an interview on the 5:00 PM show (Eastern Time) discussing this effort with an expert, (didn't get the name), and I became concerned. Am I the only one who heard this story, and why isn't it getting more coverage, if true! Y2K all over again? I don't think I could take it!
-
<p>NEWARK, N.J. (AP) -- The son of Philadelphia's former mob boss pleaded guilty to running an illegal gambling operation Thursday in a landmark legal case in which FBI agents tapped into his computer with a surveillance system designed for national security investigations.</p>
-
<p>When Apple introduced the iPod, the company was aware that people might use it to rip off music from the Net or friends' machines. Each new iPod, in fact, is emblazoned with a sticker that warns, "Don't Steal Music."</p>
<p>But it is unlikely that Apple imagined people would walk into computer stores, plug their iPod into display computers and use it to copy software off the hard drives. This is exactly the scenario recently witnessed by Kevin Webb at a Dallas CompUSA store.</p>
-
<p>A San Francisco hacker said he accessed personal information about Robert Redford, former President Jimmy Carter, Rush Limbaugh and other illustrious contributors to the New York Times when he broke into the company's computer network about 10 days ago.</p>
<p>The New York Times said it has fixed the flaws that Adrian Lamo, 21, says he exploited to wander freely through the newspaper's system.</p>
-
Court-ordered hacker exposes BIA He finds agency's computer systems highly vulnerable By John Markoff New York Times News Service WASHINGTON — Instructed by a federal judge to determine whether the computer network at the Bureau of Indian Affairs was secure from malicious intruders, Alan Balaran decided to infiltrate it. He did this not once but three times and determined among other things that skilled hackers would be able to bilk Indian funds in trust at the bureau by having checks sent to themselves. First Balaran went to a bureau building in ...
-
I noticed a lot of activity on my connection when there shouldn't have been, so I installed ZoneAlarm and (it's at 491 attempts now), checked it out. They seem to be coming from all over the world. Does anybody else have ZoneAlarm installed and can they please tell me if this is normal? Thanks
-
Been trapping a number of Netbios port scans and access,attempts tonight. In researching these attempts I found this. Electronic Warfare Associates, Inc ews.com .... Well freeper computer gurus is this innocent?
-
— A computer security researcher accessed internal New York Times computer networks this week through the Internet and managed to view hundreds of sensitive Times files. Among them: a database of 3,000 Times op-ed page contributors. The file contained Social Security numbers and other personal information belonging to luminaries like James Carville, James Baker, Larry Lessig, and Robert Redford. The researcher also got phone numbers for William F. Buckley Jr., Rush Limbaugh, Warren Beatty and Jimmy Carter. In a statement , the New York Times said it is investigating the problem. Click here for complete article.
-
At a time when few technology companies are hiring and many have laid off hundreds of thousands of workers, the government issued tens of thousands of coveted H-1B visas that allow foreign workers to hold jobs in the United States for up to six years. American tech companies have insisted for years that the visas are essential to their ability to hire the right people for key jobs, and they have persuaded Congress to increase the number of visas in the H-1B program several times. But many out-of-work American engineers and their advocates see it as a giveaway of jobs ...
-
NEW YORK (AP) Public interest groups and other Internet watchdogs are denouncing a proposal that would give the world's governments a greater say in how the Internet is run. Under the plan to overhaul the Internet Corporation for Assigned Names and Numbers, representatives chosen by governments would replace ones directly elected by the Internet community at large. The proposal, issued Sunday by ICANN president Stuart Lynn, would drop the U.S. government's original objective of transitioning to the private sector the policy decisions over domain names and other issues. Karl Auerbach, an ICANN board member often critical of his own ...
-
<p>Apart from a hefty increase in federal IT security spending in the coming year, the single most important tool the Bush administration wants to create to promote a safer Internet is a Freedom of Information Act exemption for enterprises willing to share cyber- security data with the government.</p>
-
I purchased a used Mac Power PC 8100 with a G3 from work during an equipment sale. There is a glitch and I was hoping I might find a Mac user who could walk me through a solution The screen will freeze on the desktop, with no icons showing, the first time I start it up. However when I reboot, it will start normally and it runs very well after that. I have tried some troubleshooting techniques from various books, but they do not apply. I don't have a lot of $ involved in the box (it only cost $100.00) ...
-
WASHINGTON (AP) -- Microsoft's new version of its popular Media Player software is logging the songs and movies that customers play. The company said Wednesday it was changing its privacy statement to notify customers about the technology after inquiries from The Associated Press. The system creates a list on each computer that could be a treasure for marketing companies, lawyers or others. Microsoft says it has no plans to sell the data collected by Media Player 8, which comes free with the Windows XP operating system. ``If you're watching DVDs you don't want your wife to know about, you might ...
-
Win32Yarner.A.Worm e-mail worm This worm propagates itself via e-mail by using its own SMTP. It uses Outlook and other means as a way of collecting lists of mail addresses and servers. The carrier e-mail claims to have a new version of a dial-up program detector attached, named yawsetup.exe, actually masquerading as a newer version of YAW (a legitimate software). It carries highly damaging payload and drops copies of itself with random names. Basically, it erases any files that are not currently in use including the operating system. It arrives in the following e-mail: Subject: Trojaner-Info Newsletter Attachment Name: YAWSETUP.EXE Body: ...
-
"All IP protection technologies will be cracked at some point; it's just a matter of time," Allen Nieman, Product Manager of Activation at Microsoft, told BetaNews in an interview last May. But this week Nieman's concession became a reality as a key generator capable of creating unique, valid installation and activation codes for Windows XP came to light. While patches and cracks for Windows Product Activation have existed since the release of Windows XP, would-be pirates were forced to physically modify system files and risk invalidating their operating system with updates. If it desired, Microsoft has the ability to instantly ...
-
Senators' stock options move could cost MS billions By John Lettice Posted: 14/02/2002 at 15:36 GMT Four US senators are proposing legislation that would stop companies using stock options to window-dress their earnings statements. The proposed Ending Double Standards for Stock Options Act would require companies to treat employee stock options as an expense for book-keeping purposes if they want to claim them as an expense for tax purposes. The current situation in the US allows companies to effectively hide the cost of stock options (which in essence are a part, in cases such as Microsoft a major part, ...
-
Feb. 14 - A Microsoft Corp. technology for plugging a common security hole is vulnerable to the very attack it was designed to prevent, a prominent security consultancy said. AT ISSUE IS a new version of a special-purpose program, called a compiler, that is included in a high-profile collection of programming tools Microsoft announced Wednesday at a gathering for software developers in San Francisco. The timing of the discovery is doubly embarrassing, coming a month after Microsoft Chairman Bill Gates announced a companywide commitment to improve the security features of its software. (MSNBC is a Microsoft-NBC joint venture.) Researchers at ...
-
<p>Comcast Corp., the nation's third-largest cable company, pledged Wednesday to immediately stop recording the Web browsing activities of each of its 1 million high-speed Internet subscribers.</p>
<p>Comcast said in a statement that it will stop storing the information "in order to completely reassure our customers that the privacy of their information is secure." The Associated Press reported Tuesday that the company had started recording each customer's visit to a Web page as part of a technology overhaul to save money and speed up the network.</p>
-
Comcast Corp., the nation's third-largest cable company, has started recording the Web browsing activities of each of its 1 million high-speed Internet subscribers without notifying them of the change.
|
|
|