Monthly Archives: February 2011
Microsoft: Windows Vulnerability Unlikely to Be Exploited Remotely
Exploit code for a new zero-day vulnerability targeting Windows systems has appeared on the Web.On Valentine's Day, an anonymous researcher going by the name...
Motorola CEO Jha: Google Music to Run on Xoom
Motorola Mobility CEO Sanjay Jha confirmed the existence of a Google music service, one of the worst-kept secrets the search engine has harbored as...
Researchers Store Data in Flash Memory Under Low Voltage Conditions
Researchers from University of Massachusetts Amherst and Texas A&M University have succeeded in writing information to flash memory under low-voltage conditions, paving the way...
Google Asks Patent Office for Second Opinion on Oracle’s Android Claims
Google has asked the U.S. Patent and Trademark Office to re-examine four of the patents that Oracle sued the search giant for infringing with...
Moglen Backs ‘Freedom Box’ to Deliver Internet Privacy, Security
The Secretary of State recently called Internet freedom a foreign policy priority for the United States. Now a law professor at Columbia University has...
Novell Stockholders Accept Merger With Attachmate
Stockholders of networking and middleware provider Novell voted at a special meeting Feb. 17 to accept the merger agreement made Nov. 21, 2010, with...
RSA Conference:Application Security Means Getting Corporate Buy-in, Adobe Says
Few companies have as bright a media spotlight on their security successes and failures as Adobe Systems does.During the past two years, that has...
RSA Conference: The Fog of Cyber-War
What exactly is a cyber-war, and are we in the middle of it?Here at the RSA Conference, it depends whom you ask. A panel-featuring...
Texas Attorney General Uses Google as Political Platform
What is it about Google that attorney generals with no technology background smell blood in the water and decide they want to use the...
Cyber-Criminals’ Constantly Evolving Tactics Challenge Law Enforcement
Despite the constantly changing security landscape with evolving threats and new tactics, there are several key victories in the fight against cyber-crime, experts said.There...