Search

Results 781-800 of 818 for Jack M. Germain.
TECHNOLOGY SPECIAL REPORT

Spam Wars: Fighting the Mass-Mail Onslaught

Spam is stuffing consumer and corporate e-mail inboxes with useless pitches for unwanted products and services. It is also clogging bandwidth and contributing to traffic congestion on the Internet. Experts estimate that as much as 60 percent of all e-mail that enters inboxes every day is spam, unsol...

TECHNOLOGY SPECIAL REPORT

Spam Wars: The Ongoing Battle Against Junk E-Mail

Junk e-mail, the way most computer users see it, has become more prolific than postal junk mail. It overloads inboxes and consumes valuable hours each day. Every day, e-mail users must weed through appeals to buy everything from phony products and stock offers to drugs and body-part enhancers -- not...

TECHNOLOGY SPECIAL REPORT

Sharing Files: The Untold Story of Software Piracy

File-sharing through the dozens of software piracy mills on the Internet and well-known peer-to-peer networks like Kazaa, Morpheus, iMesh, eDonkey, Gnutella, LimeWire and Grokster accounts for thousands of illegally downloaded music files, games, movies and software. Computer security experts warn t...

TECHNOLOGY SPECIAL REPORT

Experts See Sharp Rise in Malware Attack Probability

Security experts are warning that malware attacks will pose more of a major threat over the next three years than direct hacker attacks. The British mi2g Intelligence Unit claimed this week that the malware risk has risen from 1 in 40 last year to about 3 in 10 for 2004. This reflects a jump from 2....

INDUSTRY REPORT

Survey Shows Online Security Getting Better

Security attacks on IT systems have more than doubled since last year. That's what 100 IT chief security officers at financial institutions around the globe reported in a global survey compiled by Deloitte & Touche USA LLP. External security attacks on information technology systems at a samplin...

TECHNOLOGY SPECIAL REPORT

Encrypted File Sharing: P2P Fights Back

Is it possible to end the investigations and prosecutions that the RIAA, the music download police and similar entities use to prosecute users of file-sharing networks? The answer depends, say online security experts, on which next-generation technology proves to be more successful. So far, enforcem...

TECHNOLOGY SPECIAL REPORT

Battening Down the E-Mail Hatches

Viruses delivered by e-mail, phishing attacks and spam are becoming as much a part of using computers as accidents, tolls and bumper-to-bumper delays on the freeway are in commuting to work each day. Both situations cause frustration, steal productivity and cost money. Phishing scams trick e-mail re...

TECHNOLOGY SPECIAL REPORT

Managed Security Services: A Hedge Against E-Mail Attacks

In today's world of merged business and technology applications, e-mail has become as essential as the telephone. But e-mail on the corporate level is also one of the most deadly communication tools. It is through e-mail that most security risks occur, warn security specialists. If the corporate e-m...

TECHNOLOGY SPECIAL REPORT

Searching Data: Browsers, Toolbars and the Desktop

Searching for data on a PC used to be a series of isolated activities. Users needed one or more computer-based software utilities to hunt through the hard drive for specific files containing keywords. Finding information beyond the hard disk meant logging in to a library or university system and ent...

TECHNOLOGY SPECIAL REPORT

Wireless PDAs and Smartphones: A Hacker’s Heaven

A real security threat is looming with wireless PDAs, WiFi devices and smartphones. These are the electronic marvels that are pushing the goal of wireless telecommunications to new limits. Industry watchers report that people are dropping their older PDAs like hot potatoes and snapping up the latest...

Sasser Worm Poses New Security Threats

A new worm that first materialized last Tuesday appeared in its third minor variant early this morning. The Sasser worm threatens any unprotected Windows computer tethered to the Internet via a broadband connection. The rogue code was officially recognized and named early Saturday morning and is kno...

TECHNOLOGY SPECIAL REPORT

Hacker Safe: The Security of Online Commerce

In mid-March, BJ's Wholesale Club announced it was investigating a security breach that involved theft of credit card information from its computer network. Company officials ordered an exhaustive review of the retail outlet's state-of-the-industry technology systems with a leading computer security...

New Worm Starts Crawling the Net

A new worm materialized yesterday in the U.S. Pacific region and was continuing a slow circulation across the U.S. mainland last night in search of compromised computer systems. VeriSign engineers have been tracking increased Internet traffic on customers' computer systems around the country since A...

Windows Attack Code Surfaces, Foretells Worm

Early warning last week about increased signs of a possible superworm in the making may have slowed down a new attack on the Internet. But evidence continues to grow, according to a VeriSign security officer, of a major new denial-of-service attack to be mounted from thousands of already-infected co...

VeriSign Reports Massive Worm in the Works

An increase in suspicious activity last weekend has Internet security experts bracing for what some analysts warn could be the next big worm attack worldwide. Virus monitors spent the weekend watching an increased level of activity that experts said could be the start of a Blaster-like attack. A spo...

TECHNOLOGY SPECIAL REPORT

Can Software Kill You?

Software can kill you. Don't think so? Talk to the family members of 21 deceased patients treated at the National Cancer Institute in Panama in November 2000. The cancer patients died after being overdosed by a Cobalt-60 radiotherapy machine. The technicians who entered patient and medication data i...

TECHNOLOGY SPECIAL REPORT

Global Piracy: Illegal Software Markets Endure

Despite aggressive tactics by U.S. agencies to crack down on illegal software warehouses, distribution of illegal software continues to rival legitimate software retail sales. Studies by industry watchdogs show that while worldwide software piracy has declined steadily from a rate of 50 percent to a...

LOOKING FORWARD

Turning Nanotech into Profit

Compare the vastness of the Internet with the microminiaturized world of subatomic structures, and you will get an idea of the potential that nanotechnology holds for industrial profit. Some analysts are predicting nanotechnology will become the biggest boost to the technology industry since the Wor...

TECHNOLOGY SPECIAL REPORT

Global Extortion: Online Gambling and Organized Hacking

A new trend in extorting money from sports and gambling Web sites isn't going away like security experts had predicted. Online gambling Web sites began receiving e-mail threats in October of last year. The messages contained demands for money to prevent distributed denial-of-service (DDoS) attacks t...

TECHNOLOGY SPECIAL REPORT

MyDoom: A Wrap-Up on the World’s Most Vicious Worm

The family of MyDoom e-mail worms remains an active threat because of compromised computer systems and unprotected personal computers even though the virus was programmed to shut down last month. As a result of the prevalent infections, the MyDoom creators still can mobilize a vast network of comput...

Technewsworld Channels