Bots, bombs and weird science: The wackiest stories of 2009 When hard core high-tech and humanity mix you can count on some wacky or just down-right cool things happening. What we have here is our list of 25 the wackiest stories from 2009 featuring everything from high-tech toilet battles and 1,000 mph cars to shape-shifting robots and levitating mice. ISP-level filter trial vendor happy with results The vendor that provided filtering products to six of the nine ISPs participating in the Federal Government's controversial ISP-level content filtering trial says the results show the technology works. Mass. Supreme Court throws out lawsuit against BJs over '04 data breach The Massachusetts Supreme Judicial Court affirmed a lower court ruling dismissing a lawsuit brought against by BJs dozens of credit unions over a 2004 data breach. 10 Predictions for 2010: Kaminsky and Weatherford Curious about what's going to happen to our critical IT infrastructure in 2010? Here, IT security luminaries Mark Weatherford, CISO for California State, and Dan Kaminsky, finder of last year's DNS flaw, offer five predictions each. (The first of 2 parts). Google Chrome bug leaks IDs of anonymous surfers A flaw in the Google Chrome web browser that could reveal the identity of web users trying to surf anonymously, has been identified. Hackers are defeating tough authentication, Gartner warns Security measures such as one-time passwords and phone-based user authentication, considered among the most robust forms of security, are no longer enough to protect online banking transactions against fraud, a new report from research firm Gartner Inc. warns. New laws complicate security efforts in 2010 Regulatory compliance will continue to influence security projects in 2010 as a slew of new security and privacy regulations go into effect, such as the federal HITECH Act. Zero-day vulnerability threatens Adobe users Adobe is investigating possible vulnerabilities in its Reader and Acrobat applications that could allow an attacker to execute malicious code on Windows machines and completely compromise them. The 12 Cons of Christmas While the risk of being hacked, conned or having sensitive information stolen is possible all through the year, most security experts agree that the holiday season brings a spike in fraudulent activity, both online and off. Today from the Subnet communities On Cisco Subnet: Annual revenue for Cisco TelePresence and Cisco's EMC/VMware collaboration viewed favorably; On Microsoft Subnet: Power outages cause Windows Server 2008 problems; On Google Subnet: Google claims its new URL shortening service is more secure Network World on Twitter? You bet we are |
No comments:
Post a Comment