Stories by Tony Bradley

Spam Traffic Returns after Holiday Break

Spammers are people too...apparently. They have families and want to take a vacation to spend quality time with them over the traditional holiday break just like everyone else. Or, at least that is the way that it appears if you follow the trends in spam traffic.

You Too Can Be an l33t 'Whitehat' Hacker for Only US$250

The concept of ethical or whitehat hacking is nothing new. There is some merit to the "it takes a thief to catch a thief" mentality, and using the same tools employed by malicious attackers to test and fortify networks rather than compromising them. However, when the blackhats start selling "whitehat" hacking tool kits there is good reason to be skeptical.

BlackBerry Dakota signals RIM's desperation

Images and details of the BlackBerry Dakota--the impending flagship smartphone from Research In Motion (RIM)--have emerged. The Dakota is packed with features as RIM struggles desperately to regain lost ground and compete with the Apple iPhone and the rising Android invasion.

Adobe sandbox protection hacked

Last year Adobe got the message that it was the target du jour for malicious attacks and stepped up its efforts to secure and protect its software. However, a security researcher revealed that one of the security measures developed by Adobe can be circumvented with relative ease.

Protecting data on portable drives

It is almost mind-boggling how much data can be stored on a portable drive or USB thumb drive. As convenient as it is it to be able to carry 1TB of data in your pocket, though, portable drives are also easily lost or stolen, and gallivanting about can take its toll on the data. It is important to protect the portable drives and the data they contain.

Windows 8 on ARM expands Microsoft's mobile horizons

Microsoft took advantage of the spotlight at CES to show off some of the capabilities of the next-generation Windows 8 operating system, and reveal that the flagship OS will break the x86 shackles and run on ARM architecture platforms -- like tablets -- as well. There is still a long and winding road ahead, though, before you will have Windows 8 running on a tablet.

Wait for the tablet dust to settle

Vendors have descended on Las Vegas for the annual showcase of new gadgets and technologies known as CES. This year, the area that seems to be getting the most attention, and the greatest number of new devices entering the market is the tablet. The variety and competition are a good thing overall, but they are also a very good reason to hold off rather than rushing out to grab a new tablet.

Microsoft warns of new Windows vulnerability

Happy New Year! Microsoft's first Patch Tuesday for 2011 is scheduled a week from today on the 11th of January, but there's no time like the present to kick things off for the year.

Protect your backup data from Murphy's Law

Have you ever noticed that insurance seems to operate on the Murphy's Law principle? If you have it, you never need it, but as soon as the insurance is gone a catastrophe strikes. That is pretty much how backing up data often works.

Google adds hacked site alerts to search results

One of the easiest ways for attackers to lure victims is by planting malware on seemingly innocent-looking Web sites, or actually compromising legitimate Web sites. Google is doing its part to help users make informed decisions about the sites they visit, and avoid having their PCs infected with a new hacked site identification feature being added to Google search results.

Rackspace brings order to Cloud server chaos with Cloudkick

As organizations migrate to cloud-based data centers, the scalability that was originally a benefit can become a handicap, and the promise of more efficient computing becomes ethereal. Rackspace hopes to help IT admins find some peace of mind and reclaim the cloud from the chaos with the acquisition of Cloudkick.

IE blows away rivals in browser security

A new report from NSS Labs studies how various Web browsers perform when it comes to blocking socially-engineered attacks. The startling results show that Internet Explorer isn't just better than rival browsers like Chrome and Firefox -- but leaves competitors completely in the dust.

[]