Similar Articles |
|
InternetNews August 3, 2010 |
Tech Firms Split on Paying for Security Flaws Some major IT firms have made it a standard practice to pay security researchers for bringing vulnerabilities to their attention, while others have a strict prohibition against it. What accounts for the divide? |
InternetNews July 28, 2010 |
Enterprise Wi-Fi users at Risk? Although Cisco downplays the danger, researchers at the Black Hat security conference discussed a potential security vulnerability in Cisco 1200-series wireless access points. |
InternetNews October 9, 2008 Sean Michael Kerner |
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. |
InternetNews July 27, 2010 |
Security Pros Gather For Black Hat Confab Security experts, hackers and media types are filing into Sin City this week for the annual Black Hat USA security conference, a gathering that's endured and generated its share of controversy in the past. |
InternetNews July 27, 2005 Tim Gray |
Black Hat Is Back TippingPoint launched Zero Day Initiative, which rewards security researchers for informing the company of any security bugs. |
InternetNews July 21, 2010 |
Mozilla Patches 14 Firefox Security Flaws Ahead of the annual Black Hat security conference, Mozilla issues its largest patch for the open source Firefox 3.6 browser, fixing 14 security vulnerabilities. |
InternetNews February 19, 2008 Sean Michael Kerner |
Black Hat Descends on Washington Hackers flock to D.C. during this week's Black Hat conference to talk government, security and going on the defense - for a change. |
The Motley Fool January 15, 2010 Tim Beyers |
Bing Is Better Than You Think Different researchers provide different numbers? Shocking. |
InternetNews July 30, 2010 |
Researcher Warns of IE Auto-Complete Flaw At the Black Hat security conference, Whitehat Security CTO Jeremiah Grossman describes a browser flaw that could allow hackers to capture entries stored in Web forms. |
InternetNews July 30, 2007 Sean Michael Kerner |
Black Hat Cometh; You Afraid? The Black Hat conference in Las Vegas is a place where bad things are talked about openly and things that we once thought were secure get thrown out the window. |
InternetNews March 10, 2011 |
Pwn2own Hackers Tear Through Safari, IE8 At annual browser hacking competition, participants make short work of a recent version of Apple's Safari browser, while others took on Microsoft's Internet Explorer 8. |
InternetNews July 26, 2010 |
Microsoft Updates Bug Reporting Process Extending an olive branch to security researchers, Microsoft says it will provide new mechanisms to make it easier to report vulnerabilities. |
InternetNews July 29, 2010 |
Microsoft Brings an Olive Branch to Black Hat Microsoft preaches a message of cooperation with the research community at the annual Black Hat security conference, announcing details of new collaborations. |
PC Magazine December 28, 2004 Matthew Broersma |
E-Mail Scam Dupes Linux Users In late October, Red Hat warned users of an e-mail scam designed to plant malicious code on users' systems. |
InternetNews December 4, 2009 |
What's Behind the Bing Blackout? The brief downtime might not weaken users' enthusiasm, but one observer suggests it's a sign that Microsoft might be moving too quickly. |
Entrepreneur December 2005 Amanda C. Kooser |
Can You Hack It? Build the best defense you can against hackers. |
InternetNews June 22, 2006 Sean Michael Kerner |
Search Engines And Their Hacker Friends Search engines have become indispensable tools for hundreds of millions of people. Including hackers who are use them to find vulnerable networks, machines and services with relative ease. |
Technology Research News June 18, 2003 |
Nods drive audio interface Researchers from the University of Glasgow and the Canadian National Research Council have devised a pair of interaction techniques that allow people to manipulate mobile computers without looking at or talking to them. |
InternetNews August 7, 2006 Sean Michael Kerner |
Black Hat 2006: 'l33t' or 'Lame?' Was the Black Hat security conference a wake-up call for enterprises or just a snoozer? |
InternetNews August 3, 2007 Sean Michael Kerner |
Black Hat And The Jedi Force Hackers have a lot of different tools at their disposal, but low-tech hacking may be all they really need. |
InternetNews July 7, 2010 |
Hackers Snipe Back in Microsoft Security Row Bruised by Microsoft's criticism dismissing the work of third-party security researchers, a band of hackers has begun a campaign to publish proof-of-concept vulnerabilities in the software giant's products. |
InternetNews March 1, 2011 |
Google Fixes Chrome Flaws on Eve of PWN2OWN Ahead of prominent browser hacking contest, Google pushes out an update that addresses at least 19 security issues, following closely on another recent batch of security fixes. |
InternetNews February 18, 2009 Sean Michael Kerner |
Black Hat: Macs Under Attack? A security researcher says a new vulnerability could pose danger to Macs and iPhones. But we're still waiting for the proof. |
InternetNews April 27, 2010 |
Red Hat Brings Enterprise Linux to the Cloud Linux vendor debuts Red Hat Cloud Access program, offering premium enterprise subscribers the option of moving to Amazon's EC2 cloud-computing environment. |
PC Magazine June 20, 2008 Larry Seltzer |
Hacked Through the Heart Even medical gadgetry is subject to outside hacking. |
InternetNews January 27, 2010 |
Semantic Web Already Having an Impact Microsoft Bing head Scott Prevost said search engines are getting smarter thanks to Semantic Web technology. |
InternetNews March 7, 2011 |
How To Win Pwn2own Browser Hack Head of security research at HP's Tipping Point previews the annual hacking contest, which will take aim at all major Web browsers and mobile platforms. |
InternetNews June 3, 2010 |
Bing Gains Ground But Google Reigns Supreme A year after its launch, Microsoft's search engine Bing has managed to carve out a modest 3.5 percent foothold in the search market while Google commands nearly 90 percent. |
The Motley Fool September 14, 2010 Wolfgang Gruener |
Bing Hits No. 2: Microsoft's Little Engine Can! Big Softy's search engine is gaining steam. |
InternetNews July 6, 2007 Andy Patrizio |
Step Right Up, Get Your Exploits Right Here WabiSabiLabi sets up an eBay for software vulnerabilities. |
InternetNews July 31, 2009 |
Apple Fixes iPhone SMS Vulnerability Apple pushes out an OS patch just one day after the texting vulnerability debuted at Black Hat. |
The Motley Fool June 18, 2009 Rick Aristotle Munarriz |
Alarm Bells Ring Over Bing Microsoft is turning heads in search, as it's new Bing search engine continues to grow its audience. |
Search Engine Watch September 29, 2010 Gary-Adam Shannon |
White Hats: This is Why You're Getting Beaten Fire the white hat agency and "get real." Today, successful search marketing strategies absolutely must incorporate elements of black hat (or gray hat -- call it whatever you want) methodology. |
Search Engine Watch July 2, 2008 Eric Enge |
Coding Problems: How to Avoid Getting Flagged by Search Engines Some common SEO and Web development practices can be used quite legitimately, yet still could look like spam to search engines. The key is to use these techniques for legitimate reasons, use them in moderation, and in ways commonly found on the Web. |
InternetNews August 20, 2010 |
Google Nabs 11 Chrome Vulnerabilities The company shuts down a number of potentials security holes while paying out more than $10,000 to third-party researchers who discovered the flaws. |
InternetNews June 11, 2010 |
Microsoft Adds Social Features to Bing Software giant continues its push to give Bing search engine a social makeover, adding in live feeds from Facebook into search results. |
InternetNews August 3, 2010 |
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. |
The Motley Fool September 10, 2009 Rick Aristotle Munarriz |
Google Gets Even Bigger Google is introducing a marginally larger search box, with bigger search-refinement buttons below. |
InternetNews June 10, 2009 Stuart J. Johnston |
Bing's Big Week, Search Share Ticks Up After its first week on the Web, Bing appears to be gaining ground against its rivals. |
InternetNews September 17, 2010 |
Are PC Security Flaws on the Wane? New survey from HP Tipping Point finds that 2006 was a high water mark for security vulnerabilities, and that the sheer volume of flaws has since been on the decline. |
InternetNews May 29, 2009 Stuart J. Johnston |
Goodbye Microsoft Live Search, Hello Bing The software giant hopes to make headway against Google with its "decision engine" challenger to traditional search engines. |
InternetNews July 12, 2010 |
Bing Shows Slight Growth in Search Scrum Microsoft's toddling search engine managed to eke out a slight improvement in U.S. search traffic last month, according to Experian Hitwise. |
The Motley Fool September 24, 2009 Anders Bylund |
You Should Have Seen Red Hat's Success Coming Red Hat is still the tech horse you want to bet on. |
InternetNews June 1, 2009 Stuart J. Johnston |
Microsoft's Bing Goes Live Ahead of Schedule The waiting over, users now have a Bing 'preview' to search with. |
CIO July 14, 2008 Jarina D'Auria |
Five Things Kevin Mitnick Has Learned About Computer Security Legendary former hacker on hacking, being hacked, and companies that turn a blind eye to security. |