Archive

A Verizon customer in the United States has decided to singlehandedly fight the recording industry's crusade to pry from Internet service providers the names of Web surfers who share music and video files online. The customer, whose identity has not been revealed, appears to be the first consumer to...

SCO has broadened its licensing attack against IBM by terminating a Sequent license on the same grounds it used as the basis for its earlier claims against IBM. SCO maintains that its Unix source code was used in Linux and therefore violates SCO's rights. SCO, suing IBM for billions in an intellectu...

TECHNOLOGY SPECIAL REPORT

High-Tech Shift: From Home Computing to Homeland Defense

From the 1970s to the late 1990s, the computer industry's main source of revenue came from developing business and consumer markets through channels like the personal computer, client-server networking technologies and, eventually, commercialization of the Internet. But with consumer and business te...

Security software developer Zone Labs announced IMsecure Pro, a security package that the company is calling the first comprehensive instant messaging security system for the most popular messaging services, such as AOL Instant Messenger, MSN Messenger and Yahoo Messenger. IMsecure Pro is designed t...

Interoperability of different Web services specifications came closer to fruition with this week's release of the Basic Profile 1.0 by the Web Services Interoperability (WS-I) organization. Covering commonly used Web services specifications, the Basic Profile provides guidelines for how core Web ser...

As some antivirus vendors raised their alert rating on a Windows worm that has infected thousands of home and corporate computers, the spreading code continued to take over machines that might be used in an attack on Microsoft. The worm -- referred to as MS Blast, Blaster and LovSan -- does not requ...

TECHNOLOGY SPECIAL REPORT

Profile of the Superworm: SoBig.E Exposed

The SoBig.E worm, released two months ago on the Internet, continues to spread among unprotected computers. Some Internet security analysts fear that this latest variant of the SoBig family -- much like future variants of the new Microsoft Blaster worm that began to proliferate early this week -- wi...

A widely anticipated threat materialized this week as a worm that exploits a Microsoft Windows flaw began infecting some of the millions of vulnerable machines around the world. Experts said the relatively simple "Blaster" worm -- also referred to as "LoveSan" -- was spreading at a steady pace Monda...

TECHNOLOGY SPECIAL REPORT

Internet Esperanto: Web Services Enter the Mainstream

It's official: Web services technology has gone mainstream. The technology -- which consists mainly of software designed to let business systems communicate with each other across the Internet without human intervention -- is already making a huge impact on how companies share information and conduc...

Privacy advocates and foes of the Recording Industry Association of America's campaign to subpoena the names of file-sharing computer users from universities and service providers have won a small battle in the war over online music trading. A U.S. District Court has invalidated the RIAA's subpoenas...

PRODUCT PROFILE

RIM’s World-Capable Color BlackBerry 7230 Arrives

In an effort to provide businesspeople with an affordable, all-in-one mobile device, T-Mobile USA and Research In Motion have introduced the triband BlackBerry 7230 wireless handheld. For many business travelers, the ability to use the same device for wireless voice and e-mail connectivity while tra...

Consumer information held by Acxiom, one of the largest collectors and processors of such data, was reportedly accessed and downloaded recently by an intruder who broke into the company's massive database. Law enforcement officials, who notified Acxiom of the breach, have arrested a suspect in Ohio....

PRODUCT PROFILE

Help Me Obi-Wan Kenobi: Airborne Video Arrives

Most of us remember the scene in the 1977 movie "Star Wars" in which the robot R2-D2 projects a three-dimensional image of Princess Leia, who begs Obi-Wan Kenobi for help: "This is our most desperate hour. Help me, Obi-Wan Kenobi. You're my only hope." Seeing that film years ago planted the desire i...

The Linux legal war increased in scope and ferocity this week as IBM coutersued SCO, which had claimed Big Blue wrongfully used SCO Unix source code in Linux. Meanwhile, the open-source community has almost unilaterally aligned against Lindon, Utah-based SCO by supporting the counterclaim. The IBM c...

New coded exploits that take advantage of a widespread Microsoft Windows vulnerability have been posted online. By most reports, malicious scans to expose vulnerable systems are running rampant a week after government warnings regarding the flaw. Security experts said the scans for the vulnerability...


Technewsworld Channels