Forgot your password?

IT Stories for 2009

Ants Vs. Worms — Computer Security Mimics Nature 104 comments
Up To 9% of a Company's Machines Are Bot-Infected 146 comments
Idaho Tops America's Most-Spammed States 97 comments
First-Ever USB 3.0 Hard Drive 191 comments
Microsoft Says Google Chrome Frame Makes IE Less Secure 459 comments
Coverity Report Finds OSS Bug Density Down Since 2006 79 comments
Making Data Unvanish 34 comments
US Wants UK Hacker To Pay To Fix Holes He Exposed 403 comments
Are Data Center "Tiers" Still Relevant? 98 comments
Large-Scale Mac Deployment? 460 comments
The Perils of Ramming Products Down IT's Throat 461 comments
Children's Watch Allows Parents To Track Their Kid 607 comments
60 Years of Cryptography, 1949-2009 104 comments
Why Developers Get Fired 535 comments
Using Encryption Garners Exemption For Data Breach Notification 101 comments
Microsoft Files Suits Against "Malvertisers" 205 comments
Blizzard Offers Look Inside WoW At GDC 188 comments
DHS Ponders "Improving" Terrorism Alert System 320 comments
Universal "Death Stench" Repels Bugs of All Types 248 comments
Spyware Prank Exposes Hospital Medical Records 319 comments
Security / Privacy Advice? 260 comments
Feds Ask IT Execs To Throw Away Cellphones After Visiting China 382 comments
Snow Leopard Missed a Security Opportunity 304 comments
DHS To Review Report On US Power Grid Vulnerability 138 comments
SANS Report Says Organizations Focusing On the Wrong Security Threats 98 comments
Microsoft Says No TCP/IP Patches For XP 759 comments
Australian ISPs Asked To Cut Off Malware-Infected PCs 286 comments
iPhone 3.1 Update Disables Tethering 684 comments
New Standard For EU-Compliant Electronic Signatures 42 comments
New York Times Site Pop-Up Says Your Computer Is Infected 403 comments
Google Groups Used To Control Botnets 63 comments
Boston City Government Discovers Email Retention 184 comments
First Botnet of Linux Web Servers Discovered 254 comments
Oracle To Increase Investment In SPARC and Solaris 146 comments
Alan Turing Gets an Apology From Prime Minister Brown 576 comments
Greg Kroah-Hartman Gripes About Microsoft's Linux Contribution; MS Renews Effort 213 comments
AMD's DX11 Radeons Can Drive Six 30 Displays 439 comments
How Much Is Your Online Identity Worth? 199 comments
Watered Down Phishing Protection In IPhone OS 3.1? 98 comments
Vast Malware Repository Dedicated To R&D 81 comments
The Real-World State of Windows Use 374 comments
OLPC 1.5 Hardware Upgrades Include Java, Full-Screen Video 67 comments
Comparing Microsoft and Apple Websites' Usability 314 comments
Cryptographic Tools To Keep You Hidden On Facebook 148 comments
Geeks Prefer Competence To Niceness 300 comments
Microsoft, Cisco Finally Patch TCP DoS Flaw 114 comments
DRM Take II — Digital Personal Property 356 comments
Windows 7 Reintroduces Remote BSoD 427 comments
Intel Lynnfield CPU Bests Nehalem In Performance/Watt 173 comments
US Supercomputer Uses Flash Storage Drives 72 comments
A Different Perspective On Snow Leopard's Exchange Support 276 comments
Wordpress.org Warns of Active Worm Hacking Blogs 103 comments
Recovery Tool Includes Leak of Palm's WebOS 1.2 43 comments
ELF Knocks Down AM Towers To Save Earth, Intercoms 616 comments
Mozilla To Protect Adobe Flash Users 132 comments
Code-Breaking Quantum Algorithm On a Silicon Chip 133 comments
Appropriate Interviewing For a Worldwide Search? 440 comments
Symantec Wants To Use Victims To Hunt Computer Criminals 139 comments
Educause Announces Plans To Sign .edu TLD With DNSSEC 49 comments
How To Hire a Hacker 370 comments
Happy Birthday, Internet! 213 comments
Has the Rate of Technical Progress Slowed? 712 comments
The Myths of Security 216 comments
Skype Trojan Can Log VoIP Conversations 151 comments
Spammers Use Holes In Democrats.org Security 129 comments
The Story of a Simple and Dangerous OS X Kernel Bug 230 comments
Security Test Prompts Federal Fraud Alert 36 comments
Crime Expert Backs Call For "License To Compute" 327 comments
FBI Investigating Mystery Laptops Sent To US Governors 329 comments
Hackers (Or Pen-Testers) Hit Credit Unions With Malware On CD 205 comments
Snow Leopard Drops Palm OS Sync 290 comments
Bug Means High School Students' Schedule Errors May Last Days 443 comments
WPA Encryption Cracked In 60 Seconds 322 comments
Using a House's Concrete Foundation To Cool a PC 465 comments
Fear of Porn URL Exposure Discourages Firefox 3 Upgrade 673 comments
Legitimate ISP a Cover-up For a Cybercrime Network 68 comments
Sun Plans Security Coprocessor For New Ultrasparc 59 comments
Coder of Swiss Wiretapping Trojan Speaks Out 114 comments
Offshore Drilling Rigs Vulnerable To Hackers 116 comments
Dirty Coding Tricks To Make a Deadline 683 comments
Banks Urge Businesses To Lock Down Online Banking 201 comments
Making Sense of Revision-Control Systems 268 comments
Gaming the App Store 217 comments
Report That OS X Snow Leopard May Include Antivirus 335 comments
IE Should Use Google's Malware List 109 comments
Getting Through the FOSS License Minefield 96 comments
What Is the Best Way To Track Stolen Gadgets? 101 comments
Vulnerability, Potential Exploit In Cisco WLAN APs 35 comments
Anti-Spam Lawyer Loses Appeal, and His Possessions 237 comments
Real-Time Keyloggers 205 comments
Facebook App Exposes Abject Insecurity 205 comments
DOJ Gives Oracle Approval To Buy Sun 162 comments
EVE Bans Exploiters; Dropping 2% of Users Cuts Average CPU Usage 30% 261 comments
Amazon, MS, and Yahoo Against Google's Library 144 comments
Criminals Prefer Firefox, Opera Web Browsers 172 comments
Ten Ways To Destroy a Hard Disk 289 comments
PCI Express 3.0 Delayed Till 2011 80 comments
The Myth of the Isolated Kernel Hacker 282 comments
Amazon, MS, Google Clouds Flop In Stress Tests 154 comments
Pidgin Adds Google Talk Voice and Video Support (and a Vulnerability) 127 comments
Network Adapter Keeps Talking While a PC Is Asleep 188 comments
The Decline of the Landline 435 comments
How To Build a 100,000-Port Ethernet Switch 174 comments
Australian Police Database Lacked Root Password 214 comments
Predicting Malicious Web Attacks 82 comments
Scala, a Statically Typed, Functional, O-O Language 299 comments
Three Indicted In Huge Identity/Data Breach 101 comments
Amazon Confirms EC2/S3 Not PCI Level 1 Compliant 157 comments
UK Lifeguards Dig Their Own 100Mbps Fiber-Optic Link 128 comments
Arizona Judge Tells Sheriff "Reveal Password Or Face Contempt" 624 comments
C# and Java Weekday Languages, Python and Ruby For Weekends? 389 comments
14-Year-Old Wins International Programming Contest 141 comments
Twitter Used To Control Botnet Machines 127 comments
Domain Tasting "Officially Dead" Thanks To Cancellation Policy 102 comments
Why Should I Trust My Network Administrator? 730 comments
Local Privilege Escalation On All Linux Kernels 595 comments
Yahoo Revives Pay-Per-Email, With Charitable Twist 287 comments
Database Error Costs Social Security Victims $500M 299 comments
How Much Does a Reputation For Security Matter Anymore? 98 comments
WordPress Exploit Allows Admin Password Reset 100 comments
Encryption? What Encryption? 500 comments
Judge Rules Against RealDVD 407 comments
In UK, Two Convicted of Refusing To Decrypt Data 554 comments
Voting Machine Attacks Proven To Be Practical 225 comments
Schneier On Self-Enforcing Protocols 207 comments
A Standardized OS For Robots 184 comments
The Right Amount of "Challenge" In IT & Gaming 103 comments
Netflix Announces Second Data Mining Contest 56 comments
The iPhone SMS Hack Explained 94 comments
Neuros LINK Mixes Quiet, Aesthetics, and Ubuntu 121 comments
21st International Olympiad of Informatics Opens, In Bulgaria and Online 74 comments
Are Information Technology's Glory Days Over? 333 comments
Times Are Tough For Nigerian Scammers 232 comments
Poor Passwords A Worse Problem Than Poor Antivirus 247 comments
Contributing To a Project With a Reclusive Maintainer? 162 comments
Bjarne Stroustrup On Concepts, C++0x 346 comments
Microsoft Denies Windows 7 "Showstopper Bug" 241 comments
Twitter, Facebook DDoS Attack Targeted One User 205 comments
UK National ID Card Cloned In 12 Minutes 454 comments
How Can I Tell If My Computer Is Part of a Botnet? 491 comments
Examining Software Liability In the Open Source Community 241 comments
Twitter Offline Due To DDoS 398 comments
Feds At DefCon Alarmed After RFIDs Scanned 509 comments
After Links To Cybercrime, Latvian ISP Cut Off 116 comments
Mac OS X v10.5.8 Ready For Download 152 comments
Best Free Open Source Software For Windows 324 comments
Google's Launches 2nd Android Developer Contest 26 comments
XML Library Flaw — Sun, Apache, GNOME Affected 140 comments
Mario AI Competition 110 comments
Can We Abandon Confidentiality For Google Apps? 480 comments
KDE 4.3 Released 432 comments
FBI Nabs Chicago Transit Authority Radio Hacker 177 comments
Null-Prefix SSL Attacks Enabled In New sslsniff 48 comments
Phoronix Releases Linux Benchmarking Distribution 31 comments
Android Applications Soon To Run On MIPS32 Chips 93 comments
Entropy Problems For Linux In the Cloud 179 comments
First Ever Criminal Arrest For Domain Name Theft 294 comments
Has Conficker Been Abandoned By Its Authors? 174 comments
Scammer Plants a Fake ATM At Defcon 17 394 comments
Defense Department Eyes Hacker Con For New Recruits 154 comments
Bootkit Bypasses TrueCrypt Encryption 192 comments
Generating Fast MD5 Collisions With ATI Video Cards 72 comments
Apple Keyboard Firmware Hack Demonstrated 275 comments
Linux, Twitter, and Red Hat "Win" Big At Pwnie Awards 63 comments
Another New AES Attack 93 comments
10th Annual System Administrator Appreciation Day 232 comments
BIOS "Rootkit" Preloaded In 60% of New Laptops 236 comments
Hackers Get Free Parking In San Francisco 221 comments
Adobe Security Updates For Flash and Shockwave 58 comments
Emacs Hits Version 23 367 comments
Null Character Hack Allows SSL Spoofing 280 comments
Google Warns About Search-Spammer Site Hacking 59 comments
SMS Hack Could Make iPhones Vulnerable 254 comments
MI5 Website Breached By Hacker 71 comments
McAfee Leaks Conference Attendees' Personal Info 72 comments
P2P Network Exposes Obama's Safehouse Location 307 comments
Tetraktys 216 comments
Stopping Spam Before It Hits the Mail Server 157 comments
Microsoft's Urgent Patch Precedes Black Hat Session 232 comments
In Europe, Auto Spam Translation Kicks In 102 comments
New DoS Vulnerability In All Versions of BIND 9 197 comments
Sandia Studies Botnets In 1M OS Digital Petri Dish 161 comments
Netflix Prize Contest Ends, Down To the Wire 100 comments
92% of Windows PCs Vulnerable To Zero-Day Attacks On Flash 286 comments
DHS Pathogen Lab To Be Built In "Tornado Alley" 275 comments
Could Cyber-Terrorists Provoke Nuclear Attacks? 183 comments
Manager's Schedule vs. Maker's Schedule 274 comments
Shrinking Budgets Tie Hands of Security Pros 63 comments
AT&T Blocks Part of 4chan 342 comments
Security Certificate Warnings Don't Work 432 comments
Hacker Group L0pht Making a Comeback 110 comments
New Leader In Netflix Prize Race With One Day To Go 87 comments
Copyright Status of Thermodynamic Properties? 154 comments
AVG Update Breaks iTunes 185 comments
Electronic Armageddon, and No Electricity Either 158 comments
The Best First Language For a Young Programmer 634 comments
Network Solutions Suffers Massive Data Breach 70 comments
SHA-3 Second Round Candidates Released 62 comments
iPhone 3Gs Encryption Cracked In Two Minutes 179 comments
Critical Flaw Discovered In DD-WRT 225 comments
East Africa Gets High-Speed Internet Access Via Undersea Cable 198 comments
Researchers Outline Targeted Content Poisoning For P2P Data 201 comments
Stroustrup Says New C++ Standard Delayed Until 2010 Or Later 501 comments
Could the Cloud Derail a $300 Million Data Center? 109 comments
Cloud-Sourcing's Long-Term Impact On IT Careers 157 comments
Hacking Nuclear Command and Control 256 comments
'Power Capping' the Datacenter 112 comments
Registrars Still Ignoring ICANN Rules 122 comments
Keeping Up With DoD Security Requirements In Linux? 211 comments
America's 10 Most-Wanted Botnets 84 comments
POWER7 To Ship In First Half of 2010 73 comments
NSA To Use Cloud Model For Intelligence Analysis 41 comments
Adobe Chided For Insecure Acrobat Reader 179 comments
40 Million Identities Up For Sale On the Web 245 comments
Researchers Create Database-Hadoop Hybrid 122 comments
'Vanish' Makes Sensitive Data Self-Destruct 171 comments
Most Expensive JavaScript Ever? 405 comments
How They Built the Software of Apollo 11 220 comments
Delete Data On Netbook If Stolen? 459 comments
Collaborative Software For Pair Programming? 302 comments
Hacking Hi-Def Graphics and Camerawork Into 4Kb 255 comments
Is Battery-Free 2-Factor ID Secure? 180 comments
South Korea Deploys Cloned Drug-Sniffing Dogs 154 comments
WebKit For Metacity/Mutter CSS Theming? 124 comments
New Firefox Vulnerability Revealed 250 comments
Security Threats 3 Levels Beyond Kernel Rootkits 264 comments
New Linux Kernel Flaw Allows Null Pointer Exploits 391 comments
Free Rainbow Tables Looking For New Admin 95 comments
Australian Police Plan Wardriving Mission 340 comments
Firefox 3.5.1 Released 147 comments
Why OpenBSD's Release Process Works 310 comments
62% of Sun's Stockholders Vote For Oracle Deal 152 comments
Nmap 5.00 Released, With Many Improvements 73 comments
New Binary Diffing Algorithm Announced By Google 192 comments
Firefox 3.5's First Vulnerability "Self-Inflicted" 156 comments
Google's Chiller-Less Data Center 132 comments
Software Glitch Leads To $23,148,855,308,184,500 Visa Charges 544 comments
12% of E-mail Users Have Responded To Spam 268 comments
0 A.D. Goes Open Source 88 comments
The Best Game Engines 113 comments
Attacks Against Unpatched Microsoft Bug Multiply 122 comments
UK, Not North Korea, Is Source of DDoS Attacks 175 comments
German Health Insurance Card CA Loses Secret Key 174 comments
6 Reasons To License Software Under the (A/L)GPL 367 comments
Most Companies Won't Deploy Windows 7 — Survey 429 comments
Hackers' Next Target — Your Brain? 295 comments
Mass Speculation Suggests Oracle May Kill OpenSolaris 205 comments
Hello World! 199 comments
Hands-On Preview of Microsoft Office 2010 291 comments
Strong Passwords Not As Good As You Think 553 comments
Page: ← 1 2 3 →

All great discoveries are made by mistake. -- Young

 



Forgot your password?