- Welcome Guest
- Sign In
One of the Recording Industry Association of America lawsuits, launched this month against 261 accused illegal file traders, has been dismissed by the industry group, calling its technical tracking of alleged song swappers into question ...
Sending the unwanted e-mail solicitations known as spam to Californians likely will become a lot more expensive, thanks to a new law that will fine spammers and advertisers as much as US$1 million per incident. ...
Internet search leaders Overture and Google both are testing services that deliver local results as they seek to bolster the already burgeoning market for Web searches ...
Beneath all the noise generated by the latest security holes in Microsoft's Windows operating system, experts have warned of two open-source security flaws that could allow intruders to corrupt memory, take control of systems and launch a denial-of-service (DoS) attack ...
Consternation over VeriSign's plan to redirect mistyped or nonexistent domain name requests has progressed to a call from the International Corporation for Assigned Names and Numbers (ICANN) to suspend the service and a US$100 million lawsuit from a company claiming damages from it ...
The Swen computer worm is turning out to be a bigger problem than earlier expected, using a brief head start on computer antivirus defenses, as well as complex abilities and an effective masquerade, to infect Windows machines and spread via e-mail to many users ...
Similar to the action toys of two decades ago, prototype ThinkPad notebooks from IBM can be transformed from the traditional notebook form factor to a disconnected desktop with a more comfortable keyboard and separate monitor ...
Despite the recent success of computer worms, such as Blaster, that have pounced on newly discovered vulnerabilities, a new threat that looks remarkably like a legitimate security e-mail from Microsoft is using a two-year-old vulnerability to infect thousands of computers. ...
Widely used DB2 database software from IBM -- which often stores critical data, such as credit card information -- has flaws that would be "trivial" for attackers to exploit ...
The Internet community is failing to see the value of domain giant VeriSign's SiteFinder service, which redirects users to a VeriSign site with a search tool instead of producing the traditional error message for mistyped or nonexistent Internet addresses ...
Following the same pattern of predictions as the one that led to last month's devastating Blaster worm, security analysts have begun to focus on the new crop of Microsoft Windows vulnerabilities and the attack tools created to take advantage of them -- all of which could indicate that a potential new family of computer worms is in the works ...
Hoping to synchronize better with IT security's private sector, the U.S. Department of Homeland Security has enlisted Symantec vice president for managed services Amit Yoran as director of its cyber security division and has forged a partnership with the CERT Coordination Center to speed warning and response time ...
Verizon's U.S. District Court appeal over the subpoena powers granted to the Recording Industry Association of America, to be considered Tuesday, calls into question the music industry group's tactics and highlights privacy concerns ...
Hoping to hook manufacturers and shippers beholden to modest radio frequency identification (RFID) implementation requirements from companies like Wal-Mart, IBM has announced new service and software offerings to help roll out the wireless tag-tracking technology ...
An Internet-connected grid of potentially millions of personal computers is being launched by a group of UK-based universities, weather services and software companies in an effort to predict global climate ...
Coming to a notebook near you -- it's 3D display technology from Sharp. But industry observers say it is likely to be a slow start for the Mebius PC-RD3D notebook, which the electronics giant is planning to release in Japan next month and in the United States by the end of the year ...
A day before the two-year anniversary of the September 11 terrorist attacks, a series of phone calls threatening the presence of a bomb at San Francisco's Moscone Center forced the evacuation of thousands from the Oracle and Seybold trade shows ...
A 22-year-old computer hacker credited with breaking into more than a dozen networks owned by some of the largest companies in the world is facing federal charges of computer intrusion and unlawful use of passwords ...
Leveraging new wireless network technology that will more than double data rates in mobile phones, Intel has developed a single-chip processor for the next generation of mobile networks, called Enhanced Data Rates for GSM Evolution (EDGE). ...
In a letter posted today on its company Web site and some open-source sites, SCO Group chief executive Darl McBride aimed the Unix-code-in-Linux claims at Silicon Graphics, which SCO says it is in discussions with over the matter ...
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/cybersecurity-collaboration.jpg
https://www.linuxinsider.com/story/can-public-private-partnerships-improve-open-source-security-177379.html
Can Public-Private Partnerships Improve Open-Source Security?
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/developer-happy.jpg
https://www.linuxinsider.com/story/post-open-licensing-could-offer-software-devs-funding-alternatives-177371.html
Post-Open Licensing Could Offer Software Devs Funding Alternatives
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/open-source-business.jpg
https://www.linuxinsider.com/story/open-source-experts-2024-outlook-for-ai-security-sustainability-177250.html
Open-Source Experts’ 2024 Outlook for AI, Security, Sustainability
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/09/crm-gears.jpg
https://www.linuxinsider.com/story/open-source-overhaul-revitalizes-pipeliner-crm-through-forced-rebuild-177361.html
Open-Source Overhaul Revitalizes Pipeliner CRM Through Forced Rebuild
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineers-code.jpg
https://www.linuxinsider.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/smartphone-user-happy.jpg
https://www.linuxinsider.com/story/how-to-speed-up-a-suddenly-slow-android-phone-178982.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/07/Acer-Chromebook-Plus-516-GE.jpg
https://www.linuxinsider.com/story/acer-chromebook-plus-516-ge-redefines-gaming-style-computing-performance-179261.html
Acer Chromebook Plus 516 GE Redefines Gaming Style, Computing Performance
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/03/computer-programmer.jpg
https://www.linuxinsider.com/story/upgrade-to-ubuntu-pro-for-5-years-of-free-extended-support-177388.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/06/backup.jpg
https://www.linuxinsider.com/story/essential-tips-for-reliable-linux-backups-177398.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/02/IT-team.jpg
https://www.linuxinsider.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html
Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/04/Noble-Numbat.jpg
https://www.linuxinsider.com/story/upgrading-to-ubuntu-24-04-lts-noble-numbat-step-by-step-guide-177359.html
Upgrading to Ubuntu 24.04 LTS Noble Numbat: Step-by-Step Guide