Search

Results 1-20 of 1461 for Jack M. Germain.

Sasser Worm Poses New Security Threats

A new worm that first materialized last Tuesday appeared in its third minor variant early this morning. The Sasser worm threatens any unprotected Windows computer tethered to the Internet via a broadband connection. The rogue code was officially recognized and named early Saturday morning and is kno...

TECHNOLOGY SPECIAL REPORT

Hacker Safe: The Security of Online Commerce

In mid-March, BJ's Wholesale Club announced it was investigating a security breach that involved theft of credit card information from its computer network. Company officials ordered an exhaustive review of the retail outlet's state-of-the-industry technology systems with a leading computer security...

New Worm Starts Crawling the Net

A new worm materialized yesterday in the U.S. Pacific region and was continuing a slow circulation across the U.S. mainland last night in search of compromised computer systems. VeriSign engineers have been tracking increased Internet traffic on customers' computer systems around the country since A...

Windows Attack Code Surfaces, Foretells Worm

Early warning last week about increased signs of a possible superworm in the making may have slowed down a new attack on the Internet. But evidence continues to grow, according to a VeriSign security officer, of a major new denial-of-service attack to be mounted from thousands of already-infected co...

VeriSign Reports Massive Worm in the Works

An increase in suspicious activity last weekend has Internet security experts bracing for what some analysts warn could be the next big worm attack worldwide. Virus monitors spent the weekend watching an increased level of activity that experts said could be the start of a Blaster-like attack. A spo...

TECHNOLOGY SPECIAL REPORT

Can Software Kill You?

Software can kill you. Don't think so? Talk to the family members of 21 deceased patients treated at the National Cancer Institute in Panama in November 2000. The cancer patients died after being overdosed by a Cobalt-60 radiotherapy machine. The technicians who entered patient and medication data i...

TECHNOLOGY SPECIAL REPORT

Global Piracy: Illegal Software Markets Endure

Despite aggressive tactics by U.S. agencies to crack down on illegal software warehouses, distribution of illegal software continues to rival legitimate software retail sales. Studies by industry watchdogs show that while worldwide software piracy has declined steadily from a rate of 50 percent to a...

LOOKING FORWARD

Turning Nanotech into Profit

Compare the vastness of the Internet with the microminiaturized world of subatomic structures, and you will get an idea of the potential that nanotechnology holds for industrial profit. Some analysts are predicting nanotechnology will become the biggest boost to the technology industry since the Wor...

TECHNOLOGY SPECIAL REPORT

Global Extortion: Online Gambling and Organized Hacking

A new trend in extorting money from sports and gambling Web sites isn't going away like security experts had predicted. Online gambling Web sites began receiving e-mail threats in October of last year. The messages contained demands for money to prevent distributed denial-of-service (DDoS) attacks t...

SPECIAL REPORT

Software Piracy Worldwide

Software piracy is so widespread that it exists in homes, schools, businesses and government offices. According to the Business Software Alliance (BSA), an international association representing the leading software developers, software piracy is practiced by individual PC users as well as computer ...

INDUSTRY ANALYSIS

VoIP and the New Telecommunications Industry

Voice over Internet Protocol pioneers Skype, Vonage and other voice-communications purveyors have been quietly generating huge user bases online. Market analysts are reporting that VoIP services stand poised to displace conventional telecommunications pricing models. Given the success of improved Vo...

Hackers for Hire

For years there existed a fuzzy distinction between good and bad computer hackers. Black Hat hackers were known to crack into computer systems for the challenge and the bragging rights. These miscreants took great pleasure from wreaking havoc once they gained entry. White Hat hackers, on the other s...

LOOKING FORWARD

Preparing for the Superworm at the Front Lines

Imagine a war in which the combatants are invisible and the weapons they bear are hidden in trickery and stealth. Now picture that war being waged on a battlefield consisting not of desert fields but of thousands of ragtag computers in bedrooms, dens and corporate cubicles across America. These batt...

LOOKING FORWARD

Is the Superworm a Mere Myth?

If one thing is definite about Internet security and worm attacks, say experts, it is that cyber attacks are on the rise in 2004. Consider the worldwide effect of highly publicized worms like last year's SoBig series and the recent Sinit Trojan and MyDoom outbreaks. Given the potency of some of thes...

INDUSTRY REPORT

Identity Theft Online: Debunking the Myths

James Van Dyke had a hunch last year that the commonly held belief that the Internet was causing an increase in identity theft and credit card fraud was not valid. Extensive research he conducted debunks many of the myths about the correlation between online activity and ID theft. Contrary to popula...

INDUSTRY REPORT

Are Consumer-Grade Firewalls Really Secure?

With the growing demand for always-on high-speed Internet access, consumer-grade firewall boxes are becoming as common in computing as modems and mice. The prevalence of these devices makes sense, as network security and protection against intruders have become topics of great concern for home-offic...

BEST OF ECT NEWS

The Agony and the Ecstasy of Hacking the Xbox

It seemed like a no-brainer for Microsoft: Use its massive software market share to win over game players to its Xbox console. It could sell a powerful, graphics-enhanced computer for about $180 and sit back as the dollars rolled in from royalties for every Xbox game sold. The plan to practically gi...

BEST OF ECT NEWS

Computer Viruses and Organized Crime

Internet security experts are divided on the source and purpose of computer viruses and worms like Blaster and SoBig. But some government agencies are investigating a possible connection between the increasing spread of infected computers and organized crime. Recent trends are leading many experts t...

RFID Tags and the Question of Personal Privacy

Radio Frequency Identification, or RFID, is an old technology that has been quietly revolutionizing business and industry. Over the past several years, the technology has helped optimize inventory and business systems and has made consumers' lives more convenient. But some industry watchers say RFID...

Network Vulnerability and the Electrical Grid

The power blackout that struck the northern United States and Canada in August shocked industry executives into acknowledging the need to upgrade outdated grid circuitry and power-generating equipment. However, analysts and security experts now are warning that the outmoded, intrusion-prone computer...

How does the quality of customer service delivered by government compare to that of the private sector?
Loading ... Loading ...

LinuxInsider Channels