Stories by Paul Roberts

Future growth demands wireless ISPs

Aspiring entrepreneurs can only dream about a track record like Selina Lo's. First there was Centillion, a networking startup that Lo co-founded, and Bay Networks purchased for US$100 million in 1994. Lo's next act was Alteon, a maker of Gigabit Ethe...

Excuses on iPod virus not credible

Security and quality assurance experts reacted negatively to Apple Computer's efforts Tuesday to blame manufacturing problems that resulted in iPod MP3 players shipping with a virus that affects Microsoft's Windows operating system.

Rootkit Web sites fall to DDOS attack

Two prominent Web sites that specialize in remote access software known as "rootkits" have been taken offline by a large distributed denial of service (DDOS) attack. The take-down was allegedly ordered by a shadowy group of hackers and rootkit author...

Man arrested for '01 Airforce hacks

A popular Venezuelan hacker known as "RaFa" was arrested April 2 and charged with hacking into U.S. Department of Defense (DOD) servers almost four years ago.

Antivirus company warns of new Symbian Trojan

Antivirus company F-Secure is warning mobile phone users about a new malicious software program that infects phones that use the Symbian Series 60 operating system, preventing the phones from starting.

Web postcards hide Trojan horse programs

Beware of Web postcards bearing greetings. That's the advice from The SANS Institute's Internet Storm Center (ISC), which is warning about e-mail messages that pose as Web postcards, then direct recipients to a Web site that installs a Trojan horse p...

DNS pharming attacks target .com domain

A new round of so-called "pharming" attacks is targeting the .com Internet domain, redirecting some Internet users who are looking for .com Web sites to Web pages controlled by the unknown attackers.

Symantec acknowledges two holes in AV products

Security software company Symantec acknowledged that software flaws in some of its antivirus products could allow malicious hackers to use denial of service (DOS) attacks to crash systems running the software, disrupting automatic protection features...

ISPs join to 'fingerprint' Internet attacks

Leading global telecommunications companies, ISPs (Internet service providers) and network operators will begin sharing information on Internet attacks as members of a new group called the "Fingerprint Sharing Alliance," according to a published stat...

Company backs off bounty for Mac OS X virus

A company that offered US$25,000 for the first virus that automatically spreads among Apple Computer computers running the OS X operating system cancelled the virus writing contest and retracted the offer of cash, citing concerns about legal liabilit...

BMC buys OpenNetwork for $18 million

Enterprise management software company BMC Software is continuing its identity-management buying spree, announcing that it is buying OpenNetwork Technologies, a maker of Web access management and single sign-on technology, for US$18 million in cash.

Symantec: spam, phishing grow, botnets shrink in '04

A new report released by security company Symantec found that incidents of online identity theft scams, also known as "phishing attacks," skyrocketed in the second half of 2004, as did spam and new software vulnerabilities. But other Internet blights...

Symantec: spam, phishing grow, botnets shrink in '04

A new report released by security company Symantec found incidents of online identity theft scams, also known as "phishing attacks", skyrocketed in the second half of 2004, as did spam and new software vulnerabilities. But other Internet blights, suc...

IDC: Gamers are gluttons for music, too!

Care for an MP3 with that frag? Companies that want to boost sales of music and portable music players should consider marketing to a growing, but untapped audience -- hard-core gamers -- according to the results of a survey by IDC and IGN Entertainm...

RFID crack raises spectre of weak encryption

With a little bit of technical acumen and a few hundred dollars, enterprising thieves can walk away with some late model cars and gas them up for free to boot, according to research published by computer security experts at The Johns Hopkins Universi...

Most Popular Reviews

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Latest Articles

Resources

PCW Evaluation Team

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?