Search

Results 1901-1920 of 1946 for Richard Adhikari.

Symantec Bungle Unleashes Torrent of Spam, Confusion

Like cats and mice, security product vendors and cyber-criminals do not care much for each other. Over the past 24 hours, however, cyber-criminals may have just about fallen in love with Symantec, which made a mistake that let crooks launch a flood of malware on the Internet. It all began when Syman...

Data Centers and the Push to Power Down

The next five years or so will spell big trouble for data centers. About 46 percent of more than 150 IT professionals and executives surveyed earlier this year by the Business Performance Management Forum said they're running out of space, power and cooling infrastructure for their data centers. In ...

Yahoo Gives Itself a Social Makeover

Yahoo wants to tie all its various services together so each user needs to log in just once to access and manage its services, and will be able to do so from one central site. To do this, it is rewiring its architecture from the inside out and opening up its platform to third-party developers, Yahoo...

Ballmer: XP’s Demise Negotiable

Microsoft may reconsider its decision to pull Windows XP off the shelves in June if it sees enough customer demand, CEO Steve Ballmer said -- despite a huge customer outcry over the decision. Speaking at Louvain-La-Neuve University in Belgium, Ballmer also said it's a "statistical truth" that most p...

Student Journalist Twitters Himself Out of the Pen

When UC Berkeley journalism graduate student James Karl Buck was grabbed by police in the Egyptian industrial city of Mahalla El-Kobra while photographing a noisy demonstration, he sent a one-word text message to Twitter: "Arrested." That eventually got him out of jail. His Twitter followers -- frie...

Smarter Than Your Average Card

Think having a credit or debit card with your photo on it is cool? Well, how about a card the same size and thickness as a credit card, with a window that shows a passcode, and with a public key infrastructure chip on it? When you need to use the card, press on its switch and the PKI chip will run a...

A Burgeoning Bevy of Biometric Barriers

Passwords are not the best of security solutions, as enterprises and individual users have found over the years. They can be cracked or stolen, and not necessarily by high-tech means either. Often, passwords created by end users in corporations are simple, being based on numbers significant to them:...

Magnificent Seven Band Together for 4G Showdown

In a bid to avoid the bitter battles that have raged around third-generation wireless technology, owners of the patents on which the fourth-generation LTE wireless technology is built have agreed to charge each other "reasonable" license fees. The Magnificent Seven are Nokia, the world's largest han...

Securing Your Network, One Zone at a Time

As corporations implement compliance with various regulations such as Sarbanes-Oxley, they find that they end up with different zones within their network that can't talk to each other. This makes it difficult to implement an enterprise security solution. Adding virtualization to the mix complicates...

The Uneasy Future of Online Security

The face of online security will change drastically, Jim Bidzos, founder and chairman of trusted certificates vendor VeriSign, said in a keynote speech on Wednesday at the RSA Security Conference in San Francisco. "In the '70s in enterprises, there were mainly mainframes. The Internet, due to good w...

CONFERENCE REPORT

RSA Town Hall: It Takes a Village to Weather a Cyber Storm

How do you respond when hit by a cyber attack tsunami? That's the question Cyber Storm II, the most comprehensive cyber exercise ever held in the U.S., was designed to answer. Forty private sector companies, 11 Cabinet-level agencies, 10 states and five countries were involved in the March exercise,...

CONFERENCE REPORT

Chertoff on Cybersecurity: ‘Reverse Manhattan Project’ Needed

After working for years to prevent cyberterrorist attacks on the U.S., the Department of Homeland Security has approached the private sector for help. At a talk given to information security professionals at the RSA Security Conference, Homeland Security Secretary Michael Chertoff warned that a cybe...

PRODUCT PROFILE

Microsoft Releases Forefront Stirling to Beta

Microsoft has unveiled the public beta of its Forefront enterprise security product, known as "Stirling." This is a single product that delivers coordinated protection across desktop and server applications and the network edge. It comes with a single dashboard that shows all the systems protected b...

PRODUCT PROFILE

Archer Launches Exchange for Enterprise Apps

Archer Technologies on Tuesday launched the Archer Exchange, a virtual marketplace for on-demand application development wherein companies that have developed applications in-house can put them up on the exchange for sale to other corporations. The company made the announcement at the RSA Security C...

CONFERENCE REPORT

Symantec CEO Calls for Federal Hacking Law

The federal government should step in and pass laws to ensure computer security, the CEO of Symantec told a security conference Tuesday. In the last six months of 2007, nearly 50 million people worldwide were the victims of identity theft, and 70 percent of the most common malicious code used in att...

New Finjan Appliance Sniffs Web Traffic for Crimeware

Secure Web gateway products vendor Finjan unveiled version 9.0 of its Vital Security Web appliance on Monday at the RSA Security Conference. This includes a new active real-time inspection technology that checks both inbound and outbound Web traffic and SSL traffic for malicious content to provide e...

TECH BLOG

Live From RSA: Getting Ready for the Security Smackdown

It's quiet on the streets of San Francisco today, the first day of the RSA Security Conference, being held at the Moscone Convention Center south of Market Street. Traffic on the streets is light, so either the cops are doing a good job redirecting the crazy San Francisco traffic, which in this area...

Intel Unleashes Powerful, Power-Saving Atom Chips

Intel on Wednesday unveiled the Centrino Atom family of low-power processors for mobile Internet devices. It also announced a new class of inexpensive, simple Internet-centric computers, called "netbooks," which will hit the market later this year, and new developments in other chip families. The ce...

AT&T Mobilizes Television on Two New Handsets

AT&T will launch AT&T Mobile TV on Qualcomm's MediaFLO in May. The service will be available on two new handsets available exclusively at AT&T, the LG Vu and the Samsung Access. AT&T Mobile TV will offer full-length TV content and sporting events from CBS Mobile, Comedy Central, ESPN...

Google Plays Openness Card to Slip Broadband Between TV Channels

Having induced the Federal Communications Commission to open up the C block of wireless spectrum at the recent wireless auction, Google is now seeking access to another set of airwaves in pursuit of openness. This time, it wants to open up the unlicensed parts of the TV broadcast spectrum, the so-ca...

Technewsworld Channels