Korea DDOS virus mission shifts to destroying, erasing data They say what goes around comes around and on Friday owners of bot-infested PCs in South Korea will discover that's true. IBM security software masks confidential info IBM researchers said today they have developed software that uses optical character recognition and screen scraping to identify and cover up confidential data. Private P2P Networks Add Trust to File Sharing Stephane Herry says that he founded his private file-sharing network GigaTribe out of frustration at not being able to share files with his friends on Kazaa. Every time he searched for a file that he knew a friend had uploaded, he saw only similar files uploaded by strangers. Microsoft admits it knew of critical IE bug in early '08 Microsoft on Thursday confirmed it has known about a bug behind widespread Internet Explorer attacks for more than a year, but defended its security process against critics who say it should have acted faster. Text message scammers quietly prey on regional banks You get a text message from your bank telling you there's been suspicious activity on your account. You call the number on your phone to see what's going on, and before you know it, you're a victim. July Giveaways Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31. Network World on Twitter? You bet we are |
No comments:
Post a Comment