Kevin Fogarty | February 7, 2014
Fazio Mechanical Systems denies it had much access to Target networks or that it was a conduit for hackers, while claiming it was also a victim of cyberattack.
Kevin Fogarty | February 6, 2014
NBC News-got-hacked story ignores FSB surveillance that makes NSA look indifferent, warns of rampant hackery after opening spam email.
The architect of Google’s global datacenter network blogged nostalgically on the 15th anniversary of the day he first saw Google’s tiny, PC-filled server cage.
Kevin Fogarty | February 5, 2014
DARPA releases non-classified but often highly sophisticated apps for translation, data management, and visualization for community development.
Without major reforms and serious limitations on what the NSA can do, Section 215 of the Patriot Act will be allowed to expire, the legislation’s author warns.
Target CFO admits company had to be told it had been breached, and missed malware on some POS systems for three days after declaring itself clean.
Kevin Fogarty | February 4, 2014
Web traffic from a zombie asking for orders from its botnet can look almost identical to ‘normal’ network traffic; the key is to focus on the ‘almost.’
Kevin Fogarty | February 3, 2014
Corporate security is shockingly bad because an ever-more-complex ‘attack surface’ makes it difficult to keep up with threats.
Power running one direction down a nanowire gives off a red light, one molecule wide, that could be used in optical-computing chips or advanced OLEDs.
Kevin Fogarty | February 1, 2014
Russian cyberwar ambitions appear to have been re-energized by discovery of the sophisticated data-stealing “Red October” malware.
Kevin Fogarty | January 30, 2014
Long considered a frontrunner for the job, Admiral Michael S. Rogers will reportedly take over as NSA chief from Gen. Keith Alexander.
Adding virtualization, security, management, custom apps, and legacy support to Android on a flash drive changes the options regarding secure remote-access decisions.
Kevin Fogarty | January 29, 2014
Silicon that mimics brain cells, connected in the same pattern as a fly’s smell-processing center, shows speed and power in solving computing problems.
AMD executive predicts new server CPU could help AMD steal back market share from Intel.
Kevin Fogarty | January 28, 2014
Akamai’s State of the Internet Report showed China reclaiming the lead as a source of Internet attacks during 3Q 2013; port 445 reclaimed its spot as a favorite target.
Microsoft released specs for high-performance, high-efficiency cloud-server modules and management software as its contribution to the Open Compute Project.
New U.S. Department of Justice rules let Google, Yahoo, others report more about federal demands for user data.
Kevin Fogarty | January 27, 2014
A deftly rendered, malicious version of the most-popular open-source FTP client looks just like the genuine article.
Video shows Steve Jobs’ natural showmanship, and the kludginess of ancient Apple and Microsoft OSes.
Kevin Fogarty | January 24, 2014
Sugar-powered enzymatic fuel cell design produces power an order of magnitude greater than the lithium-ion equivalent.
Most malware writers treat Windows as the ultimate target; a new wrapper on an existing Trojan inverts that idea, using Windows to infect Android devices.
Kevin Fogarty | January 23, 2014
The White House has already rejected the conclusions of a review board that insisted bulk metadata collection is explicitly illegal and violates the First and Fourth Amendments.
For the second time in ten years, Lenovo has acquired a hardware business from IBM.
Kevin Fogarty | January 22, 2014
A bug in Google Chrome would let malicious sites take over a PC microphone, and listen whether or not users turn the hardware off.
A new report suggests Russia is chasing China for the global industrial-espionage crown, followed by a ragtag collection of hactivists and criminals.
Recent news events re: Bitcoin ...
Read the 41 comments Voted on 2630 times.