Spammers are people too...apparently. They have families and want to take a vacation to spend quality time with them over the traditional holiday break just like everyone else. Or, at least that is the way that it appears if you follow the trends in spam traffic.
The concept of ethical or whitehat hacking is nothing new. There is some merit to the "it takes a thief to catch a thief" mentality, and using the same tools employed by malicious attackers to test and fortify networks rather than compromising them. However, when the blackhats start selling "whitehat" hacking tool kits there is good reason to be skeptical.
Images and details of the BlackBerry Dakota--the impending flagship smartphone from Research In Motion (RIM)--have emerged. The Dakota is packed with features as RIM struggles desperately to regain lost ground and compete with the Apple iPhone and the rising Android invasion.
As technology evolves, many of the barriers that have traditionally limited telecommuting continue to disappear.
Microsoft is easing in to 2011 with a light Patch Tuesday for January. There are only two security bulletins this month, and only one of those two is rated as Critical by Microsoft.
Last year Adobe got the message that it was the target du jour for malicious attacks and stepped up its efforts to secure and protect its software. However, a security researcher revealed that one of the security measures developed by Adobe can be circumvented with relative ease.
It is almost mind-boggling how much data can be stored on a portable drive or USB thumb drive. As convenient as it is it to be able to carry 1TB of data in your pocket, though, portable drives are also easily lost or stolen, and gallivanting about can take its toll on the data. It is important to protect the portable drives and the data they contain.
Microsoft took advantage of the spotlight at CES to show off some of the capabilities of the next-generation Windows 8 operating system, and reveal that the flagship OS will break the x86 shackles and run on ARM architecture platforms -- like tablets -- as well. There is still a long and winding road ahead, though, before you will have Windows 8 running on a tablet.
Vendors have descended on Las Vegas for the annual showcase of new gadgets and technologies known as CES. This year, the area that seems to be getting the most attention, and the greatest number of new devices entering the market is the tablet. The variety and competition are a good thing overall, but they are also a very good reason to hold off rather than rushing out to grab a new tablet.
Happy New Year! Microsoft's first Patch Tuesday for 2011 is scheduled a week from today on the 11th of January, but there's no time like the present to kick things off for the year.
Apple fans have enjoyed a false sense of security, but Apple platforms and devices are increasingly a ripe target for attack.
Have you ever noticed that insurance seems to operate on the Murphy's Law principle? If you have it, you never need it, but as soon as the insurance is gone a catastrophe strikes. That is pretty much how backing up data often works.
One of the easiest ways for attackers to lure victims is by planting malware on seemingly innocent-looking Web sites, or actually compromising legitimate Web sites. Google is doing its part to help users make informed decisions about the sites they visit, and avoid having their PCs infected with a new hacked site identification feature being added to Google search results.
As organizations migrate to cloud-based data centers, the scalability that was originally a benefit can become a handicap, and the promise of more efficient computing becomes ethereal. Rackspace hopes to help IT admins find some peace of mind and reclaim the cloud from the chaos with the acquisition of Cloudkick.
A new report from NSS Labs studies how various Web browsers perform when it comes to blocking socially-engineered attacks. The startling results show that Internet Explorer isn't just better than rival browsers like Chrome and Firefox -- but leaves competitors completely in the dust.