Search

Results 761-779 of 819 for Jack M. Germain.
TECHNOLOGY SPECIAL REPORT

MyDoom: A Wrap-Up on the World’s Most Vicious Worm

The family of MyDoom e-mail worms remains an active threat because of compromised computer systems and unprotected personal computers even though the virus was programmed to shut down last month. As a result of the prevalent infections, the MyDoom creators still can mobilize a vast network of comput...

INDUSTRY ANALYSIS

VoIP and the New Telecommunications Industry

Voice over Internet Protocol pioneers Skype, Vonage and other voice-communications purveyors have been quietly generating huge user bases online. Market analysts are reporting that VoIP services stand poised to displace conventional telecommunications pricing models. Given the success of improved Vo...

BEST OF ECT NEWS

Is the Superworm a Mere Myth?

If one thing is definite about Internet security and worm attacks, say experts, it is that cyber attacks are on the rise in 2004. Consider the worldwide effect of highly publicized worms like last year's SoBig series and the recent Sinit Trojan and MyDoom outbreaks. Given the potency of some of thes...

LOOKING FORWARD

Preparing for the Superworm at the Front Lines

Imagine a war in which the combatants are invisible and the weapons they bear are hidden in trickery and stealth. Now picture that war being waged on a battlefield consisting not of desert fields but of thousands of ragtag computers in bedrooms, dens and corporate cubicles across America. These batt...

INDUSTRY REPORT

Identity Theft Online: Debunking the Myths

James Van Dyke had a hunch last year that the commonly held belief that the Internet was causing an increase in identity theft and credit card fraud was not valid. Extensive research he conducted debunks many of the myths about the correlation between online activity and ID theft. Contrary to popula...

INDUSTRY REPORT

Are Consumer-Grade Firewalls Really Secure?

With the growing demand for always-on high-speed Internet access, consumer-grade firewall boxes are becoming as common in computing as modems and mice. The prevalence of these devices makes sense, as network security and protection against intruders have become topics of great concern for home-offic...

BEST OF ECT NEWS

Microsoft, Security and the Road Ahead

Microsoft officials are promising to provide more help in solving security threats that have plagued users of the company's best-known products. But Microsoft will rely on third-party vendors to provide at least some of the solutions. The software giant announced its new strategies for securing its ...

BEST OF ECT NEWS

The Agony and the Ecstasy of Hacking the Xbox

It seemed like a no-brainer for Microsoft: Use its massive software market share to win over game players to its Xbox console. It could sell a powerful, graphics-enhanced computer for about $180 and sit back as the dollars rolled in from royalties for every Xbox game sold. The plan to practically gi...

BEST OF ECT NEWS

Computer Viruses and Organized Crime

Internet security experts are divided on the source and purpose of computer viruses and worms like Blaster and SoBig. But some government agencies are investigating a possible connection between the increasing spread of infected computers and organized crime. Recent trends are leading many experts t...

RFID Tags and the Question of Personal Privacy

Radio Frequency Identification, or RFID, is an old technology that has been quietly revolutionizing business and industry. Over the past several years, the technology has helped optimize inventory and business systems and has made consumers' lives more convenient. But some industry watchers say RFID...

Network Vulnerability and the Electrical Grid

The power blackout that struck the northern United States and Canada in August shocked industry executives into acknowledging the need to upgrade outdated grid circuitry and power-generating equipment. However, analysts and security experts now are warning that the outmoded, intrusion-prone computer...

Identity Theft Countermeasures

The Federal Trade Commission announced in September that 27.3 million Americans have fallen victim to identity theft in the past five years. About half of those thefts took place last year. According to the FTC report, the thefts resulted from several outlets that include credit cards, ATM machines ...

Computer Viruses and Organized Crime: The Inside Story

Internet security experts are divided on the source and purpose of computer viruses and worms like Blaster and SoBig. But some government agencies are investigating a possible connection between the increasing spread of infected computers and organized crime. Recent trends are leading many experts t...

Microsoft Passport and the Future of Authentication

Microsoft's .NET Passport, one of the largest online authentication services in operation, has more than 200 million active accounts and handles more than 4 billion authentications per month. As a whole, Microsoft's .NET Passport service is a collection of Internet-based technologies designed to mak...

TECHNOLOGY SPECIAL REPORT

The Insider’s Guide to Overclocking

Computer hobbyists for years have tweaked their computers' innards to squeeze out extra bits of performance. Known as overclocking, the practice has long been a holy grail to users who demand maximum performance from their systems. But overclocking a system poses hazards to the hardware, making the ...

TECHNOLOGY SPECIAL REPORT

Beyond Biometrics: New Strategies for Security

Biometric security devices -- which authenticate a person's identity on the basis of physical characteristics, such as a fingerprint -- have been available in one form or another for 30 years. But biometrics technology for computer security might never achieve widespread use because of the predomina...

Denial of Service – Exposed

Analysts credit advance warning about the Blaster worm, in addition to Microsoft's clever rewriting of standard Internet-connection protocols, as the weapons used in defeating a denial-of-service attack against the software company's Windows help Web site on August 16th. The Blaster worm, which infe...

TECHNOLOGY SPECIAL REPORT

Microsoft’s Advanced-Research Division Comes of Age

Last month Microsoft hosted a summit to discuss major computing problems. The event has become an annual showcase for new research projects and for the massive dollar endowments that Microsoft's advanced-research division -- called Microsoft Research, or MSR -- provides to a worldwide network of uni...

TECHNOLOGY SPECIAL REPORT

Profile of the Superworm: SoBig.E Exposed

The SoBig.E worm, released two months ago on the Internet, continues to spread among unprotected computers. Some Internet security analysts fear that this latest variant of the SoBig family -- much like future variants of the new Microsoft Blaster worm that began to proliferate early this week -- wi...

Technewsworld Channels