Archive

Posts Tagged ‘it’

Threat of Cyberwar Is Over-Hyped

January 17th, 2011 01:56 admin View Comments

nk497 writes “A new OECD report suggests the cyberwar threat is over-hyped. A pair of British researchers have said states are only likely to use cyberattacks against other states when already involved in military action against them, and that sub-state actors such as terrorists and individual hackers can’t really do much damage. Dr. Ian Brown said, ‘We think that describing things like online fraud and hacktivism as cyberwar is very misleading.’”

Source: Threat of Cyberwar Is Over-Hyped

Cassandra 0.7 Can Pack 2 Billion Columns Into a Row

January 16th, 2011 01:58 admin View Comments

angry tapir writes “The cadre of volunteer developers behind the Cassandra distributed database have released the latest version of their open source software, able to hold up to 2 billion columns per row. The newly installed Large Row Support feature of Cassandra version 0.7 allows the database to hold up to 2 billion columns per row. Previous versions had no set upper limit, though the maximum amount of material that could be held in a single row was approximately 2GB. This upper limit has been eliminated.”

Source: Cassandra 0.7 Can Pack 2 Billion Columns Into a Row

Facebook Opens Up Home Addresses and Phone Numbers

January 16th, 2011 01:06 admin View Comments

An anonymous reader writes “Do you really want third-party app developers on Facebook to be able to access your mobile phone number and home address? Facebook has announced that developers of Facebook apps can now gather the personal contact information from their users. Security firm Sophos describes it as ‘a move that could herald a new level of danger for Facebook users’ and advises users to remove their home address and phone numbers from the network immediately.”

Source: Facebook Opens Up Home Addresses and Phone Numbers

ClamAV For Windows Open Beta Begins

January 16th, 2011 01:41 admin View Comments

An anonymous reader writes “The public beta for ClamAV for Windows 3.0, which includes full integration of the ClamAV engine into the Immunet Protect product, is now open. If you are interested in playing with ClamAV for Windows 3.0, please see these forums. 32-bit and 64-bit versions are available for download. ClamAV for Windows should not be confused with ClamWin, a separate project.”

Source: ClamAV For Windows Open Beta Begins

Man Mines Facebook For Security Questions, Nabs Nude Photos From Email

January 16th, 2011 01:02 admin View Comments

itwbennett writes “George Bronk, 23, has pleaded guilty to charges that he broke into the e-mail accounts of thousands of women, scouring them for nude photos that he then posted to the Internet. How he did it: He searched his victims’ Facebook pages for answers to common security questions and then logged in to their e-mail accounts. In one case he persuaded a victim to send him even more explicit photographs by threatening to post the ones he’d stolen if she didn’t. Bronk faces 6 years in prison on felony hacking, child pornography and identity theft charges.”

Source: Man Mines Facebook For Security Questions, Nabs Nude Photos From Email

Tomcat 7 Finalized

January 16th, 2011 01:18 admin View Comments

alphadogg writes “The volunteer developers behind Apache Tomcat have released version 7.0.6 of the open-source Java servlet container. ‘This is the first stable release of the Tomcat 7 branch,’ developer Mark Thomas wrote in an e-mail announcing the release on various Tomcat developer mailing lists. While not a full application server, Tomcat implements the functionality described in the Java Enterprise Edition Web profile specifications. Most notably, it supports version 3.0 of the Servlet API (application programming interface) and version 2.2 of JavaServer Pages, both part of the recently ratified JEE 6. A servlet container manages Java-based applications that can be accessed from a Web browser. One big area of improvement is in configuration management for Web applications. Previous versions required all Web app configuration changes to be entered in a central file called web.xml, a process that led to unwieldy web.xml files as well as security risks.”

Source: Tomcat 7 Finalized

Should Employees Buy Their Own Computers?

January 14th, 2011 01:26 admin View Comments

Local ID10T writes “Data security vs. productivity. We have all heard the arguments. Most of us use some of our personal equipment for work, but is it a good idea? ‘You are at work. Your computer is five years old, runs Windows XP. Your company phone has a tiny screen and doesn’t know what the internet is. Idling at home is a snazzy, super-fast laptop, and your own smartphone is barred from accessing work e-mail. There’s a reason for that: IT provisioning is an expensive business. Companies can struggle to keep up with the constant rate of technological change. The devices employees have at home and in their pockets are often far more powerful than those provided for them. So what if you let your staff use their own equipment?’ Companies such as Microsoft, Intel, Kraft, Citrix, and global law firm SNR Denton seem to think it’s a decent idea.”

Source: Should Employees Buy Their Own Computers?

Trend Micro Chairman Says Open Source Is a Security Risk

January 14th, 2011 01:26 admin View Comments

dkd903 writes “Steve Chang, the Chairman of Trend Micro, has kicked up a controversy by claiming that open source software is inherently less secure than closed source. When talking about the security of smartphones, Chang claimed that the iPhone is more secure than Android because being an open-source platform lets attackers know more about the underlying architecture.” This comes a week after Trend Micro released a mobile security app for Android.

Source: Trend Micro Chairman Says Open Source Is a Security Risk

Are 10-11 Hour Programming Days Feasible?

January 13th, 2011 01:20 admin View Comments

drc37 writes “My current boss asked me what I thought of asking all employees to work 10-11 hour days until the company is profitable. He read something from Joel Spolsky that said the best way to get new customers is to add new features. Anyways, we are a startup with almost a year live. None of the employees have ownership/stock and all are salary. Salaries are at normal industry rates. What should I say to him when we talk about this again?”

Source: Are 10-11 Hour Programming Days Feasible?

Amazon EC2 Enables Cheap Brute-Force Attacks

January 13th, 2011 01:50 admin View Comments

snydeq writes “German white-hat hacker Thomas Roth claims he can crack WPA-PSK-protected networks in six minutes using Amazon EC2 compute power — an attack that would cost him $1.68. The key? Amazon’s new cluster GPU instances. ‘GPUs are (depending on the algorithm and the implementation) some hundred times faster compared to standard quad-core CPUs when it comes to brute forcing SHA-1 and MD,’ Roth explained. GPU-assisted servers were previously available only in supercomputers and not to the public at large, according to Roth; that’s changed with EC2. Among the questions Roth’s research raises is, what role should Amazon and other public-cloud service providers play in preventing customers from using their services to commit crimes?”

Source: Amazon EC2 Enables Cheap Brute-Force Attacks

YOYOYOOYOYOYO