Items tagged with SEC

There has been much concern over the security and privacy of social networking sites.  Much of the flak has been directed at the sites themselves.  But a study run by security company Sophos showed, once again, that the real security hole, lies in users.By creating a  fake ID around a green frog name "Freddi Staur" (which is an anagram of ID Fraudster), and inviting 200 real users to be its friend, Sophos showed just how easy it is to get private info. Without any "hacking" whatsoever, the tub toy managed to acquire a treasure trove of personal data. About 73 people were willing to post their birthday, while others willingly included places of birth, employers' names and addresses,... Read more...
Second Life is fairly unique amongst a crowd of Dwarf & Goblin infested online worlds, as it doesn’t focus on gold coins, levels or even experience points.  Residents of Second Life go about a wide array of tasks, almost all of which could be easily done in the real world.  There are still limits to what people can or should do, but scripting tools allow tech savvy users to expand those possibilities to include things like sexual acts.So what happens when real life software piracy intrudes on the world of Second Life?  Especially when it involves the piracy of above mods.We’re finding the answer to that now as 46-year-old Ken Alderman’s company, Eros LLC, is suffering a decline in sales.... Read more...
A recent article in The Inquirer indicated that ATI, as well as other vendors, had  "particularly badly" written drivers which could expose the Vista kernel to attack.  This afternoon ATI plans to release a new driver package with a critical security fix in response to this issue. "The market recently discovered a potential security vulnerability that could impact AMD's Catalyst software package. After immediate investigation, AMD determined that a small section of code from one of the files in our installer package is potentially vulnerable," Carvill said. AMD is advising ATI Radeon graphics users to update to Catalyst version 7.8 once it is available at its software and drivers... Read more...
NVIDIA Announces Second Quarter Earnings Conference Call SANTA CLARA, CA—NVIDIA Corporation (Nasdaq: NVDA) will host a conference call to discuss its financial results for the second quarter of its fiscal year 2008 on August 9, 2007 at 2:00 PM, Pacific Time. The Company's prepared remarks will be followed by a question and answer period, which will be limited to questions from financial analysts and institutional investors. To listen to the conference call, please dial 212-231-2901; no password is required. The conference call will also be Web cast live (listen-only mode) at the following Web sites: www.nvidia.com and www.streetevents.com...... Read more...
Advertisers have decided that they want to have a presence in Second Life, even though they don't know what it is, really. Throwing money at a technology you don't understand? Check. Inflated traffic figures?  Check. A vague sense of urgency coupled with 6 and 7 figure outlays? Check. No way to measure return? Check. Hey, look, they've put the nineties back together again and they call it Second Life. Once you put in several hours flailing around learning how to function in Second Life, there isn't much to do. That may explain why more than 85 percent of the avatars created have been abandoned. Linden's in-world traffic tally, which factors in both the number of visitors and time spent,... Read more...
Have you ever wondered why there are so many viruses and other malware out there just waiting to infect your PC(s)?  Is it really possible that there are so many people these days who have the intelligence and the lack of scruples required to make so many viruses?  Or is it more probable that there are a few bright people out there who have let greed override their sense of right and wrong and are willing to sell the fruits of their intellectual labor to others?  It could very well end up being a mix of the two and other factors, but it certainly seems that a program called Pinch could very well be an example of the latter: “One of the most dangerous features of Pinch can be exploited through... Read more...
AMD Reports Second Quarter Results – Microprocessor Unit Shipments Increase 22% Year-Over-Year and 38% Sequentially – SUNNYVALE, Calif. — July 19, 2007 — AMD (NYSE: AMD) today reported financial results for the quarter ended June 30, 2007.  AMD reported second quarter 2007 revenue of $1.378 billion, an operating loss of $457 million, and a net loss of $600 million, or $1.09 per share.  These results include an impact... Read more...
Intel Second-Quarter Revenue $8.7 Billion Revenue $8.7 Billion, up 8 Percent Year-over-Year Operating Income $1.35 Billion, up 26 Percent Year-over-Year Net Income $1.3 Billion EPS 22 cents SANTA CLARA, Calif., July 17, 2007 – Intel Corporation today announced second-quarter revenue of $8.7 billion, operating income of $1.35 billion, net income of $1.3 billion and earnings per share (EPS) of 22 cents. The results include tax items that increased EPS by approximately 3 cents along with restructuring charges... Read more...
Google today announced that it has reached a settlement to acquire Postini, a company that provides clients with security services (protecting instant messaging, e-mail, and other modes of communication). The $625 million deal gives Google access to an established clientele of over 35,000 businesses and 10 million international users, and is expected to close by the end of September 2007. “‘With this transaction, we’re reinforcing our commitment to delivering compelling hosted applications to businesses of all sizes,’ said Google Chief Executive Eric Schmidt in a statement.” Google believes that the deal will allow them to supply organizations with more hosted services that are comparable... Read more...
BlackBerrys can be quite useful for staying in touch, sending media, and even sending business related files.  People might want to draw the line at sensitive government data: "We're not at war with France, at least not the last time I checked, but that doesn't mean that the French want their state secrets coursing through the U.S. telecommunications infrastructure, courtesy of French government officials addicted to les BlackBerrys. Sure, BlackBerrys come with built-in encryption, but is that enough when you really, really don't want anyone to get their hands on the information you're carrying around?" While BlackBerrys do have encryption, it might not be up to the task of protecting sensitive... Read more...
If you are one of those people who already owns an Apple TV, then you might want to go into your menu and force an update.  The security patch that fixes a buffer overflow issue will not be part of automatic updates at this time. Description: A buffer overflow vulnerability exists in the UPnP IGD (Internet Gateway Device Standardized Device Control Protocol) code used to create Port Mappings on home NAT gateways in the Apple TV implementation. By sending a maliciously crafted packet, a remote attacker can trigger the overflow which may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation when processing... Read more...
Care to guess how many computer viruses, thefts, hacker break-ins, and other security issues the Department Of Homeland Security has suffered over the past 2 years?  If you guessed over 800, you're a right! "In one instance, hacker tools for stealing passwords and other files were found on two internal Homeland Security computer systems. The agency's headquarters sought forensic help from the department's own Security Operations Center and the U.S. Computer Emergency Readiness Team it operates with Carnegie Mellon University.In other cases, computer workstations in the Coast Guard and the Transportation Security Administration were infected with malicious software detected trying to communicate... Read more...
The UK's Barclays Bank is beginning to use two factor authentification for transactions online to combat fraud. They are supplying 500,000 customers with a PINsentry device that would make it imposible for a phishing scam to clean out your bank account by simply getting their hands on your log-in password. While broadly welcomed, many in the industry have been concerned at the slow introduction of two-factor authentication. "It has taken banks a while to get round to tokens because it is a cost to them," said Tony Redmond, chief technology officer at HP Services and HP Security. "Some bankers have said that this is because it is more expensive to introduce tokens... Read more...
If you've ever wondered about the whys and wherefores behind all the security changes that Microsoft made in Vista (vs. XP), then Ars Technica has a story for you: "Over the years, much has been made of Windows' security or (perceived) lack thereof. Though Microsoft's record has certainly improved in recent years, many industry observers feel that the company could do more. So Vista does more, both to address old-fashioned security issues like buffer overflows and more recent "innovations." Especially significant is the modern phenomenon of spyware, and some of the much less modern phenomena such as rootkits that go along with it. Vista's most obvious, noticeable measures are aimed at just... Read more...
First ... Prev 2 3 4 5 6 Next ... Last