Monthly Archives: July 2008

Are Security Bugs Special?

0
I spend a lot of my time writing about security bugs found in products and what is done about them. In fact, there are...

Data Recovery Service Saves Key Evidence in Rape Case

0
Thanks to some quick work at Seagate Recovery Services, a confessed rapist will get the punishment he deserves after almost wriggling out of a...

Cuil Search Engine Mismatches Brand Images

0
Two days into general public use and startup search engine Cuil is already in hot water.Thanks to quirks in Cuil's search algorithm, search results...

How to Improve Network Availability While Lowering Operational Expenses

0
/images/stories/70x50/bug_knowledgecenter_70x70_(2).jpgThere's always a little hesitation when organizational change takes place. But when our departments at State of Kansas were mandated to find ways to...

ZoneAlarm ForceField Complicates Browser Security

0
Check Point's ZoneAlarm ForceField is designed to secure Web browsing sessions through the use of browser virtualization, inline download scanning and DNS validation services....

Sophos Pursues Rivals with Plans to Buy Utimaco

0
As the race to put more security technologies on the endpoint continues, Sophos needs to add strong encryption and data loss prevention technologies to...

BT Buys VOIP Provider Ribbit for $105M

0
Update: BT has agreed to buy VOIP company Ribbit for $105 million in cash.Ribbit's platform lets developers add voice and automation features to most...

HP, Intel, Yahoo Team for Cloud Computing Research

0
Hewlett-Packard, Intel and Yahoo have entered into a pact to create new research and development centers that will test the limits of cloud computing.The...

HP Warns on OpenView Net Services Flaw

0
HP is warning users of its OpenView Internet Services management package to be aware of a flaw in another product bundled with the software...

Beware of Fake Trend Micro AV Program

0
Chinese malware distributors are hammering on a time-honored method for distributing their wares to unsuspecting users, forwarding an attack accompanying an anti-virus program, in...