Daily Technology News
GM Aims for Global IP System
General Motors agrees to a $1 billion, five-year contract with AT&T to continue development of a
global IP network.
Patrick Thibodeau, Computerworld
Wednesday, February 21, 2007 04:00 PM PST
General Motors Corp. has agreed to a US$1 billion, five-year contract with AT&T to help the auto maker continue development
of a global IP network supporting voice, data, video and other services, the two companies said Wednesday.
The announcement renews an earlier five-year agreement between the two companies, but also expands on it by giving AT&T
responsibility for managing GM's relationships with its other telecom providers, some 150 companies globally. The management
role for AT&T is part of GM's overall goal to ensure that all of its IT providers work together and follow a consistent
set of service and support practices.
"It follows the mindset that information technology providers have to work as one in a corporation," said Ralph Szygenda,
GM's CIO and group vice president. "They can't work as a bunch of IT companies competing against each other inside your own
company."
GM has already taken this approach in its IT contracts and is outsourcing some $15 billion in IT world over five years.
GM began awarding contracts one year ago this month, with Electronic Data Systems Corp. continuing to have the largest share
of the auto maker's IT services work, with contracts valued at about $1.4 billion annually.
AT&T now provides GM with a global virtual private network and has built an IP network based on Multiprotocol Label
Switching (MPLS) technology, which allows network traffic management by priority.
"Now the next five years is really taking it to a totally different level," Szygenda said. The auto maker today runs operations
on a global basis, with the capability to work with designers and suppliers no matter where they are located, he said. The
company wants to continue to build out the capabilities of its MPLS network that will integrate voice, data and video, he
said.
Ron Spears, executive vice president of AT&T global business sales, said the work at GM to integrate its communication
platform, which includes (VOIP) voice over IP, is "in process and in progress" and will take some 18 months to reach the point
"where they are running effectively a complete IP infrastructure environment on a global basis."
The goal of this IP-based system is to have a consistent experience for GM workers no matter where they are located. "At
its simplest level, there will be a voice mail platform that will look the same to every General Motors employee around the
world," said Spears, and that is not a trivial task. Historically, "it's been a hodgepodge of systems mostly built by the
regional entities, and that's true in most enterprises today," he said.
Szygenda said company engineers and support staff work as teams, and the company can't have separate telecom and management
systems supporting them. "That doesn't work when you are running a real-time global company," he said. "You don't want to
have any differences."
Szygenda said GM's decision to go with MPLS technology as a "good bet" for the company when it was made about four years
ago, and the "next thing now is to leverage all of it" and build out the capability and manage it as one system, he said.
"The real end goal is that every employee has the same type of capabilities no matter where they are in the world," Szygenda
said, "and in fact, when they wake up they don't need to know where they are in the world. It just works."
Second Security Rival Knocks Microsoft Antispyware App
Another Microsoft security rival claims that Windows Defender blocked only some of the malware thrown
at it.
Gregg Keizer, Computerworld
Wednesday, February 21, 2007 02:00 PM PST
Another Microsoft Corp. security rival posted results Wednesday of tests claiming that Windows Defender, Microsoft's antispyware
software, blocked only a portion of the malware thrown at it.
The trials, conducted by Enex TestLab but paid for by Australia-based vendor PC Tools, concluded that Defender was able
to sniff out and block 46.6 percent of the sample spyware set when running its quick scan, and 53.4 percent using the more
time-intensive full scan. Defender ships as part of Windows Vista but is also available as a free download for Windows XP.
PC Tools' flagship product, Spyware Doctor, fared better, according to Enex, which said the software's quick scan blocked
83.3 percent of the spyware and its full scan stopped 88.7 percent.
Last month, Boulder, Colo.-based Webroot Software Inc. ran similar tests on Defender, using a spyware sample of its own
creation, and claimed that the Microsoft title barred the door against just 16 percent of the sample malware.
PC Tools took aim at Webroot as well as Microsoft. "While we agree with the overriding conclusion that Vista security is
lacking, [Webroot's] approach fundamentally contradicts the laws of statistical analysis, and clearly creates a bias result,"
Simon Clausen, PC Tools' CEO, said in a statement. "By hand-picking the sample set, it is easy to return results showing whatever
you want. It would even be possible to show Vista had 0 percent blocking ability."
Clausen said that Enex Testlab, not PC Tools, choose the spyware and adware to throw against Defender and Spyware Doctor.
Over the past year, various analysts have pegged stand-alone antispyware software as a dead end, primarily because Microsoft
gives away Defender and bundles it with Vista. Other factors accounting for the prediction include the move toward comprehensive
suites from the likes of Symantec Corp. and McAfee Inc. that boast spyware detection as well as antivirus scanning.
Windows Defender recently came under increased scrutiny for a flaw in the malware-scanning engine that drives it and all
other Microsoft security software. The bug, which was disclosed Feb. 13 in the month's regularly-scheduled patch update, was
fixed for most users -- including those running Windows Vista -- by automatic upgrades that actually began arriving on PCs
in late January.
A Microsoft spokesman could not be reached for comment.
Defender can be downloaded free of charge for Windows XP or Windows Server 2003 from the Microsoft Web site.
Pharming Attack Targeted Bank Customers Worldwide
A pharming attack that targeted online banking customers in the U.S., Europe and Asia-Pacific has been
shut down.
Jeremy Kirk, IDG News Service
Thursday, February 22, 2007 06:00 AM PST
An attack this week that targeted online customers of at least 50 financial institutions in the U.S., Europe and Asia-Pacific
has been shut down, a security expert said Thursday.
The attack was notable for the extra effort put into it by the hackers, who constructed a separate look-alike Web site
for each financial institution they targeted, said Henry Gonzalez, senior security researcher for Websense Inc.
To be infected, a user had to be lured to a Web site that hosted malicious code exploiting a critical vulnerability revealed
last year in Microsoft Corp.'s software, Websense said.
The vulnerability, for which Microsoft had issued a patch, is particularly dangerous since it requires a user merely to
visit a Web site rigged with the malicious code.
Once lured to the Web site, an unpatched computer would download a Trojan horse in a file called "iexplorer.exe," which
then downloads five additional files from a server in Russia. The Web sites displayed only an error message and recommended
that the user shut off their firewall and antivirus software.
If a user with an infected PC then visited any of the targeted banking sites, they were redirected to a mock-up of the
bank's Web site that collected their login credentials and transferred them to the Russian server, Gonzalez said. The user
was then passed back to the legitimate site where they were already logged in, making the attack invisible.
The technique is known as a pharming attack. Like phishing attacks, pharming involves the creation of look-alike Web sites
that fool people into giving away their personal information. But where phishing attacks encourage victims to click on links
in spam messages to lure them to the look-alike site, pharming attacks direct the victim to the look-alike site even if they
type the address of the real site into their browser.
"It takes a lot of work but is quite clever," Gonzalez said. "The job is well done."
The Web sites hosting the malicious code, which were located in Germany, Estonia and the U.K., had been shut down by ISPs
as of Thursday morning, along with the look-alike Web sites, Gonzalez said.
It was unclear how many people may have fallen victim to the attack, which went on for about three days. Websense did not
hear of people losing money from accounts, but "people don't like to make it public if it ever happens," Gonzalez said.
The attack also installed a "bot" on users' PCs, which gave the attacker remote control of the infected machine. Through
reverse engineering and other techniques, Websense researchers were able to capture screenshots of the bot controller.
The controller also shows infection statistics. Websense said at least 1,000 machines were being infected per day, mostly
in the U.S. and Australia.
Firefox Loses Browser Share, Safari Gains
Net Applications reports that Firefox lost share but Apple's Safari continued to gain ground.
Gregg Keizer, Computerworld
Wednesday, February 21, 2007 03:00 PM PST
Mozilla Corp.'s Firefox browser lost market share last month, Web metrics company Net Applications reported Wednesday.
But Apple Inc.'s Safari continued to gain ground, an indicator of a slow but sure uptick in Macintosh sales.
In January, Firefox accounted for 13.7 percent of the browser usage market, Aliso Viejo, Ca.-based Net Applications said,
down slightly from 14 percent the month before. The dip was the first since May 2006. Since then, Firefox's share has risen
continually month to month.
"It appears to be a real dip," not a statistical anomaly, said Vincent Vizzaccaro, Net Applications' executive vice president
of marketing and strategic relationships. "It's still bigger than November, though, as if Firefox had a little spike in December.
"Firefox has had minor setbacks like this before," said Vizzaccaro.
More conspicuous than Firefox's slip, however, has been Safari's steady march. The Apple browser, which is based in part
on the open-source Konqueror, boosted its share to 4.7 percent in January from 4.2 percent in December. A year ago, Safari
held 3.1 percent of the browser market.
"The more interesting trend is on the Safari side," said Vizzaccaro. "It looks like it's taking share away from browsers
in the Windows environment."
Net Applications, which also tracks Web users' operating systems, said that the increase in Safari's share has been matched
move for move by a climb in Mac OS X use. In January, the combined PowerPC- and Intel-based Mac OS X share was 6.2 percent,
up from December's 5.7 percent. "Both Safari and Mac OS X are heading in the same direction -- up," Vizzaccaro said.
Windows XP still has an overwhelming lead in operating systems, however, with 85 percent. Microsoft's Internet Explorer
accounted for 79.8 percent of the browser market in January.
Windows Vista, which debuted to businesses in November but only hit retail Jan. 30, had just 0.2 percent share by then,
according to Net Applications.
Read RSS, Get Hacked
Web feed services such as Real Simple Syndication (RSS) and Atom may be sending you malicious code along
with your favorite Web content.
Jaikumar Vijayan, Computerworld
Wednesday, February 21, 2007 02:00 PM PST
Users of Web feed services such as Real Simple Syndication (RSS) and Atom might want to make doubly sure they are not downloading
malicious code along with their favorite Web content.
That's because the growing use of Web feed readers and the proliferation of content-aggregation sites are giving hackers
a really simple way to deliver keystroke loggers, Trojan horses and other malware onto their computers, security analysts
warn.
The feed-hacking threat is not particularly new. However, the severity of the problem could be rising as feed services
begin moving into the mainstream, said Ray Dickenson, vice president of product management at Authentium Inc., a Palm Beach,
Fla.-based security vendor. "Malware authors are just taking advantage of the interconnectedness of Web 2.0" to distribute
their code more efficiently, he said.
Web feed services such as RSS allow Web content from multiple sources to be aggregated and automatically delivered to a
desktop without requiring the user to actually visit any of the content-providing sites. Users simply subscribe to syndicated
news and content feeds. Then, feed readers and content aggregators regularly check the feeds for updated content on the users'
behalf -- and automatically push it out to the user when something new is found.
The security problem arises from the fact that many RSS and Atom-based feed readers and aggregators simply pull in the
content from the source without first checking to see whether it might contain malicious code, said Michael Sutton, security
evangelist at SPI Dynamics Inc., an Atlanta-based Web application security vendor.
"It is like any other Web application security problem," Sutton said. "It all stems from the problem that user input is
widely accepted without any validation. It's a huge problem. The server side and the client side are assuming that people
are going to be inputting stuff the developer expected them to."
In other words, feed readers assume that the content being pulled in is a story or a blog and make little attempt to sanitize
the content, he said. That makes it easier for attackers to inject into a Web feed malicious JavaScript and other code for
stealing passwords and data or for remotely controlling computers, said Jeremiah Grossman, founder and chief techology officer
at WhiteHat Security Inc. in Santa Clara, Calif.
"Unfortunately, many of the applications that receive [feed] data do not consider the security implications of using content
from third parties and unknowingly make themselves and their attached systems susceptible to various forms of attack," Robert
Auger, formerly of SPI Dynamics, said in a white paper released last year.
As a result, the "potential for using Web-based feeds as an exploit deployment vector for both known and zero-day exploits
is rather large," he said. The issue is amplified when a feed is resyndicated to other sites. "The potential exposed user
base could be in the millions, making it an attractive method for worm deployment," Auger wrote.
One relatively easy way that hackers can take advantage of a feed is to plant a comment containing malicious JavaScript
on a blog site that allows readers to leave comments. If the blog's RSS feed is set up to deliver comments as part of the
feed, the malicious code gets distributed to subscribers, Dickenson said.
A hacker might also choose to distribute a tainted blog feed to a trusted content-aggregation site, from which the malicious
code could get distributed to users who are subscribed to the aggregator's feeds, Grossman said.
Given the number of RSS readers being downloaded every day and the number of Web sites that aggregate and publish RSS feeds,
it's easy to see why feed injection could become an even bigger nuisance than spam, Dickenson said.
An analysis of malware samples with embedded URL links showed that hackers are already turning to blog feeds in a big way,
Dickenson added. Of the 60,000 malware samples studied by Authentium recently, more than 1,000 had URL links with the word
"blog" in them, he said.
Google Says Diagnostics Don't Catch Many PC Drive Failures
Built-in disk drive diagnostics only predict about half the drive failures that occur, Google said after
studying thousands of drives.
Chris Mellor, Techworld
Wednesday, February 21, 2007 01:00 PM PST
Google research has shown that built-in disk drive diagnostics only predict about half the drive failures that occur.
Modern disk drives have a built-in self-test and diagnostic facility termed Self-Monitoring, Analysis and Reporting Technology--SMART.
The drive firmware monitors a range of drive parameters, things like the number of seek errors and the disk spin-up time.
If these parameters degrade over time it may indicate the unit is heading for a breakdown. With advance warning of an impending
disk failure you will have a chance to move files and/or replace the unit before you lose any data.
Google's study looked at more than one hundred thousand disk drives which were a combination of serial and parallel ATA
consumer-grade hard disk drives, ranging in speed from 5400 to 7200 rpm, and in size from 80 to 400 GB. The observed range
of annualized failure rates varied from 1.7 percent, for drives that were in their first year of operation, to over 8.6 percent,
observed in their third year.
The paper (in PDF format) is called Failure Trends in a Large Disk Drive Population.
Diagnostic Tools Uneven
The Google researchers found that SMART diagnostics are not as useful as they are supposed to be. They note that there
is little independent research into drive life and diagnostics, stating 'Most of the available information comes from the
disk manufacturers themselves. Their data are typically based on extrapolation from accelerated life test data of small populations
or from returned unit databases.'
They note 'detailed studies of very large populations (of hard drives) are the only way to collect enough failure statistics
to enable meaningful conclusions. In this paper we present one such study by examining the population of hard drives under
deployment within Google's computing infrastructure.' Google has 'built an infrastructure that collects vital information
about all Google's systems every few minutes, and a repository that stores these data in time-series format (essentially forever)
for further analysis.'
Google's Findings
The researchers mined this data and analyzed it looking for correlations between hard drive sensor and SMART readings and
failure events. Their findings were:
-- Very little correlation between failure rates and either raised temperature or activity levels.
-- Some SMART parameters (scan errors, reallocation counts, offline reallocation counts, and probational counts) have a
large impact on failure probability. Others do not. Out of all failed drives, over 56 percent of them had no count in any
of these four strong SMART signals.
-- There was a lack of failure-predicting SMART signals on a large proportion of failed drives.
-- Taking all SMART signals and temperature readings into account they found about 36 percent of all failed drives had
no predictive failure signals at all.
Their conclusion was that 'it is unlikely that an accurate predictive failure model can be built based on these signals
alone." Further "models based on SMART parameters alone are unlikely to be useful for predicting individual drive failures."
The Future
Google's researchers hope that predictive models that 'use parameters beyond those provided by SMART could achieve significantly
better accuracies. For example, performance anomalies and other application or operating system signals could be useful in
conjunction with SMART data to create more powerful models.'
Google uses millions of drives so its findings should be taken seriously by the hard drive industry, also by customers
implementing disk-to-disk backup systems who need to have better disk failure protection built into their D2D systems--meaning
stronger RAID schemes, such as RAID 6 or DP, and more spare drives.
Apple, Cisco Settle iPhone Dispute
Apple and Cisco agree to share the iPhone name, explore interoperability.
Sumner Lemon, IDG News Service
Thursday, February 22, 2007 07:00 AM PST
Cisco and Apple have settled a dispute over rights to use the iPhone name. Under terms of the agreement, both companies have the right to use the name.
In addition, Cisco and Apple have agreed to "explore opportunities for interoperability" in security and communications
technologies for consumers and business users, they said in a brief statement. Other terms of the agreement, which heads off
a lawsuit filed by Cisco over rights to the iPhone trademark, were not disclosed.
Cisco sued Apple last month in the U.S. District Court for the Northern District of California for infringing its iPhone
trademark with the announcement of a cellular handset that bears the same name. At that time, Cisco said it obtained rights
to the iPhone name through its 2000 acquisition of Infogear, which had a product line called iPhone.
In addition, Cisco's Linksys division last year began selling a line of dual-mode cordless phones, called iPhone, that let users make Voice over IP calls.
Cisco's lawsuit against Apple came shortly after CEO Steve Jobs last month announced the company's own iPhone cellular
handset at the Macworld Conference & Expo in San Francisco. That announcement was made without an agreement with Cisco
to use the iPhone name, a company spokesman said at the time.
Prior to Jobs' iPhone announcement, Apple and Cisco had discussed terms of an agreement for Apple to use the name. Those
discussions continued after the iPhone announcement and the filing of the lawsuit, ultimately resulting in the settlement.
iTunes Offering IFC's Indie Films
IFC 2007 Independent Spirit Award nominees among movies now available on iTunes.
Peter Cohen, Macworld
Thursday, February 22, 2007 06:00 AM PST
IFC Entertainment on Wednesday announced that it is offering independent films for sale and download through Apple's iTunes
Store. The company is including all of its 2007 Independent Spirit Award nominees.
IFC Entertainment includes IFC Films and IFC Productions. The company also runs a cable television channel, the Independent
Film Channel. Their recent productions include Wordplay, a documentary on New York Times crossword puzzle editor Will Shortz;
and SherryBaby, a drama featuring Maggie Gyllenhaal. Past IFC Films work includes the Oscar-winning Hilary Swank film Boys
Don't Cry and Touching the Void, a documentary about two climbers who came close to death in the Peruvian Andes.
The IFC Entertainment offerings added to the iTunes Store are full-length movies. The new collection includes a total of
13 films, six of which are nominated for the upcoming Independent Spirit Awards, which will be held on Feb. 24, 2007. All
IFC films on iTunes cost US$9.99.
Cisco Backtracks on Open Source Promise
A Cisco official said today that the company has not made up its mind yet about the future of its CTA
software.
Paul F. Roberts, InfoWorld
Wednesday, February 21, 2007 05:00 PM PST
After promising to turn the client software for its CTA (Cisco Trust Agent) into an open-source application, Bob Gleichauf,
CTO of Cisco's Security Technology Group, said that the company has not made up its mind yet about the future of the software.
"Where I misspoke was speaking in terms of CTA going open source as if that's a given, and that was incorrect. That was
my mistake," Gleichauf told InfoWorld last week. "It has been part of a discussion of a number of different options available
to us, but it's not a viable option at this time," he said.
A more circumspect Gleichauf said that in earlier comments he was just speculating that CTA might be turned into an open-source
component. "Open source was one thing that's a way of dealing with various components as work toward an integrated solution,"
he noted
He declined to discuss the pros and cons of going open source with the CTA client, a desktop software agent that is used
to enforce security policies on machines that seek access to networks.
However, Gleichauf did say that he was concerned about the reaction of Cisco customers to comments he made to InfoWorld
at the RSA Conference in early February, saying that Cisco would "open up" CTA within two months so it could devote development
resources to other areas of NAC.
"We don't want partners and customers to think we're pursuing that. That was a mistake," he said. "Customers need to know
how to prepare for any new initiative or technology or product. What I did a disservice to on everyone was stating something
as a fact that wasn't a fact and that can affect planning, whether a funding decision or a build decision or a partner decision.
"
As for the future of NAC, Gleichauf said that Cisco is looking for ways to tie Cisco's NAC appliance, formerly known as
Cisco "Clean Access," with the company's NAC "framework," a larger NAC solution, which relies on Cisco routers and switches
to do policy enforcement.
"Cisco's in the process of leveraging its best of breed product, which is Cisco Clean Access, and the framework product
and migrating toward an integrated solution that gives customers a lot of choices. As we do that, we're going to be continually
evaluating where the focus is and how we manage the investment in terms of the engineering," Gleichauf said.
Cisco's divided appliance and framework approaches are the most pressing issue for the company, not the CTA client, said
Russell Rice, director of marketing in the Security Technology Unit.
"What we want to deliver to the market is the ability to have those be tied together technologically so that they use common
components. That's what we don't have in the marketplace, and that's what our customers are asking us to achieve," Rice said.
Cisco is wrestling with the uncomfortable fact that adoption of the NAC framework lags far behind use of the NAC appliance,
Rice said.
"We have 1,500 clients who we talk about using NAC. The majority of those have been going down the appliance route. A lot
of people look at framework and say, 'There are a lot of features that are valuable, but how do you put these together?'"
Rice said.
In the end, Cisco may end up throwing the CTA client open source as a way to differentiate itself from Microsoft's NAP
technology, which is integrated in the Vista operating system, said Zeus Kerravala, an analyst at Yankee.
"Cisco's wondering 'how do we differentiate our own client?' Allowing application developers to experiment with it is one
way, and the best way to do that is open source," Kerravala said.
The stakes for Cisco are low as only a handful of its customers have committed to the CTA, Kerravala said.
Adam Hansen, security manager at the law firm Sonnenschein, Nath & Rosenthal, LLP said that, in the scheme of things,
open sourcing the CTA client -- or not -- was of little importance. However, Cisco might derive considerable value from
opening other elements of NAC framework and making it easier for third-party vendors to plug into it.
"You don't get value from NAC. You get value from systems that interoperate with NAC," Hansen said.
Thus far, however, Cisco's integration with other products -- especially those of competitors in the networking infrastructure
space, is almost nonexistent, while the cost of implementing the NAC framework end to end is prohibitive, Hansen said.
Cisco's idea of enforcing policy at the infrastructure level may be superior to other solutions, such as Microsoft's NAP.
However, NAP could end up winning out at companies by virtue of being less expensive and easier to deploy, Hansen said.
"Cisco's great at IOS and turning ports on an off, but they're late to the security game, and Microsoft may end up dominating
it," he said.
Gleichauf acknowledged that customers want choice and that moving to an open-standards model could stimulate that, but
he said that Cisco will have to work towards it incrementally.
"What we've discovered even using a lot of standards-based protocols is that you have to sort out a lot of moving parts,
and that's not where you start. That may be where Cisco ends up with this technology, but in order to get something in customer
hands that works, you've got to start picking pieces that you control and can shape and working towards an enterprise product,"
Gleichauf said.
GM Aims for Global IP System General Motors agrees to a $1 billion, five-year contract with AT&T to continue development
of a global IP network. http://www.pcworld.com/article/129245-1/article.html?tk=nl_dnxnws
Second Security Rival Knocks Microsoft Antispyware App Another Microsoft security rival claims that Windows Defender
blocked only some of the malware thrown at it. http://www.pcworld.com/article/129261-1/article.html?tk=nl_dnxnws
Pharming Attack Targeted Bank Customers Worldwide A pharming attack that targeted online banking customers in
the U.S., Europe and Asia-Pacific has been shut down. http://www.pcworld.com/article/129270-1/article.html?tk=nl_dnxnws
Firefox Loses Browser Share, Safari Gains Net Applications reports that Firefox lost share but Apple's Safari
continued to gain ground. http://www.pcworld.com/article/129246-1/article.html?tk=nl_dnxnws
Read RSS, Get Hacked Web feed services such as Real Simple Syndication (RSS) and Atom may be sending you malicious
code along with your favorite Web content. http://www.pcworld.com/article/129262-1/article.html?tk=nl_dnxnws
Google Says Diagnostics Don't Catch Many PC Drive Failures Built-in disk drive diagnostics only predict about
half the drive failures that occur, Google said after studying thousands of drives. http://www.pcworld.com/article/129238-1/article.html?tk=nl_dnxnws
Apple, Cisco Settle iPhone Dispute Apple and Cisco agree to share the iPhone name, explore interoperability. http://www.pcworld.com/article/129271-1/article.html?tk=nl_dnxnws
ITunes Offering IFC's Indie Films IFC 2007 Independent Spirit Award nominees among movies now available on iTunes. http://www.pcworld.com/article/129263-1/article.html?tk=nl_dnxnws
Cisco Backtracks on Open Source Promise A Cisco official said today that the company has not made up its mind
yet about the future of its CTA software. http://www.pcworld.com/article/129247-1/article.html?tk=nl_dnxnws
Sony's Fast CD/DVD Recorder Blazingly
fast Sony DRX-830UL-T CD/DVD recorder won't leave
you twiddling your thumbs. http://www.pcworld.com/article/129264-1/article.html?tk=nl_dnxnws
Microsoft, AT&T Head to the Supreme Court U.S. Supreme Court hears arguments in Microsoft v. AT&T
patent case. http://www.pcworld.com/article/129280-1/article.html?tk=nl_dnxnws
Spam Reaches an All-Time High Most e-mail will be spam by the end of this year, researcher says. http://www.pcworld.com/article/129272-1/article.html?tk=nl_dnxnws
Lenovo to Sell Thinkpads in Circuit City Stores Lenovo said it will try to win even more U.S. small business
customers by selling its laptops at the computer retailer's stores. http://www.pcworld.com/article/129248-1/article.html?tk=nl_dnxnws
New Backup Recovery System for Small Businesses Fujitsu Siemens has launched a fully automated backup recovery
system for small to midsize businesses. http://www.pcworld.com/article/129273-1/article.html?tk=nl_dnxnws
Google Patches Serious Desktop Flaw A serious flaw in Google's desktop software could be used to wreak havoc on a victim's PC. http://www.pcworld.com/article/129249-1/article.html?tk=nl_dnxnws
Canon Announces New Cameras, Camcorders New Canon products include digital cameras, DVD camcorders, and photo
printers. http://www.pcworld.com/article/129274-1/article.html?tk=nl_dnxnws
Norton 360 to Ship Next Month Symantec's next-generation desktop security software is set to ship in the middle
of next month, according to Amazon.com. http://www.pcworld.com/article/129266-1/article.html?tk=nl_dnxnws
Social Networks Key to 2008 Race Social networking sites have changed the game for political candidates. http://www.pcworld.com/article/129275-1/article.html?tk=nl_dnxnws
Microsoft's List of Verified Vista Applications Microsoft has verified 800 applications to run bug-free
on Windows Vista. http://www.pcworld.com/article/129267-1/article.html?tk=nl_dnxnws
Microsoft, AT&T Patent Case Before Supreme Court Arguments were heard today in a case whose outcome
could require software companies to pay fines for patent-infringing software assembled in other countries. http://www.pcworld.com/article/129259-1/article.html?tk=nl_dnxnws
Vista's UAC Warnings Can't Be Trusted, Symantec Says Hackers can trick Windows Vista's User Account Control to
hide malware, researcher found. http://www.pcworld.com/article/129268-1/article.html?tk=nl_dnxnws
Google Apps Upgrade Threatens Office Company's major upgrade of Google Apps poses serious competition to Microsoft
Office. http://www.pcworld.com/article/129278-1/article.html?tk=nl_dnxnws
Hurd Pressures HP Storage Sales Team HP needs to invest in its storage sales force, says CEO Hurd. http://www.pcworld.com/article/129279-1/article.html?tk=nl_dnxnws
A Tale of Many New Cell Phones Cool gadgets from Asia this month also include a Toshiba laptop equipped for HD
DVD-R. http://www.pcworld.com/article/129101-1/article.html?tk=nl_dnxnws
Sleek BlackBerry 8800 Lacks Some Features The mostly elegant BlackBerry 8800 smart phone is more mainstream than
its predecessors but suffers from missing features. http://www.pcworld.com/article/129260-1/article.html?tk=nl_dnxnws
Learning Software for Babies Giggles Computer Funtime learning software is designed for babies aged 6 to 24 months. http://www.pcworld.com/article/129236-1/article.html?tk=nl_dnxnws
___________________________________________________________________________________________
Spyware & Security and E-mail
Visit our Info Centers for the latest news in the fight against spyware and spam, and learn
about the latest e-mail, IM, and VoIP technologies--and how to get the most out of them.
Spyware & Security Info Center
Communications Info Center
This Week in the Spyware & Security Info Center
February 22nd, 2007
If you're not paranoid already, this should get you started: PC World security expert Erik Larkin discovered that new "contactless"
credit cards can broadcast your data to anyone with a RFID scanner. Go to our top story for details on the problem and how
to avoid it. This week we've also got news on the latest Trojan horse making the rounds, a new technology that stops worm
outbreaks 'within milliseconds,' and a warning to readers who haven't changed their home router password. Read on for links
to those stories, plus bargain pricing on antivirus and security utilities.
Top Story
"New Credit Cards May Leak Personal Information": Many 'contactless' credit cards can leak their owner's name
and card number for reading at a distance. PCW report
News
"'Storm Trojan' Ignites Internet Worm War": The Trojan horse that pumped up spam volumes in January is at it
again, researchers said, and is now spreading over instant messaging. Computerworld report
"U.S. Researchers Claim New System Kills Worm Outbreaks": Technique claims to be able to stop Internet worms
within milliseconds of an outbreak. Techworld report
"Drive-by Web Attack Could Hit Home Routers: If you haven't changed the default password on your home router,
do so now. IDG News Service report
Shop for Antivirus and Security Tools
Antivirus Software: PC World Shopping
Security Software: PC World Shopping
You have
visited my page for: |
|
seconds! |
|