Monthly Archives: February 2011

Microsoft: Windows Vulnerability Unlikely to Be Exploited Remotely

0
Exploit code for a new zero-day vulnerability targeting Windows systems has appeared on the Web.On Valentine's Day, an anonymous researcher going by the name...

Motorola CEO Jha: Google Music to Run on Xoom

0
Motorola Mobility CEO Sanjay Jha confirmed the existence of a Google music service, one of the worst-kept secrets the search engine has harbored as...

Researchers Store Data in Flash Memory Under Low Voltage Conditions

0
Researchers from University of Massachusetts Amherst and Texas A&M University have succeeded in writing information to flash memory under low-voltage conditions, paving the way...

Google Asks Patent Office for Second Opinion on Oracle’s Android Claims

0
Google has asked the U.S. Patent and Trademark Office to re-examine four of the patents that Oracle sued the search giant for infringing with...

Moglen Backs ‘Freedom Box’ to Deliver Internet Privacy, Security

0
The Secretary of State recently called Internet freedom a foreign policy priority for the United States. Now a law professor at Columbia University has...

Novell Stockholders Accept Merger With Attachmate

0
Stockholders of networking and middleware provider Novell voted at a special meeting Feb. 17 to accept the merger agreement made Nov. 21, 2010, with...

RSA Conference:Application Security Means Getting Corporate Buy-in, Adobe Says

0
Few companies have as bright a media spotlight on their security successes and failures as Adobe Systems does.During the past two years, that has...

RSA Conference: The Fog of Cyber-War

0
What exactly is a cyber-war, and are we in the middle of it?Here at the RSA Conference, it depends whom you ask. A panel-featuring...

Texas Attorney General Uses Google as Political Platform

0
What is it about Google that attorney generals with no technology background smell blood in the water and decide they want to use the...

Cyber-Criminals’ Constantly Evolving Tactics Challenge Law Enforcement

0
Despite the constantly changing security landscape with evolving threats and new tactics, there are several key victories in the fight against cyber-crime, experts said.There...