Stories by Paul Roberts

Future growth demands wireless ISPs

Aspiring entrepreneurs can only dream about a track record like Selina Lo's. First there was Centillion, a networking startup that Lo co-founded, and Bay Networks purchased for US$100 million in 1994. Lo's next act was Alteon, a maker of Gigabit Ethe...

Excuses on iPod virus not credible

Security and quality assurance experts reacted negatively to Apple Computer's efforts Tuesday to blame manufacturing problems that resulted in iPod MP3 players shipping with a virus that affects Microsoft's Windows operating system.

Rootkit Web sites fall to DDOS attack

Two prominent Web sites that specialize in remote access software known as "rootkits" have been taken offline by a large distributed denial of service (DDOS) attack. The take-down was allegedly ordered by a shadowy group of hackers and rootkit author...

Man arrested for '01 Airforce hacks

A popular Venezuelan hacker known as "RaFa" was arrested April 2 and charged with hacking into U.S. Department of Defense (DOD) servers almost four years ago.

Antivirus company warns of new Symbian Trojan

Antivirus company F-Secure is warning mobile phone users about a new malicious software program that infects phones that use the Symbian Series 60 operating system, preventing the phones from starting.

Web postcards hide Trojan horse programs

Beware of Web postcards bearing greetings. That's the advice from The SANS Institute's Internet Storm Center (ISC), which is warning about e-mail messages that pose as Web postcards, then direct recipients to a Web site that installs a Trojan horse p...

DNS pharming attacks target .com domain

A new round of so-called "pharming" attacks is targeting the .com Internet domain, redirecting some Internet users who are looking for .com Web sites to Web pages controlled by the unknown attackers.

Symantec acknowledges two holes in AV products

Security software company Symantec acknowledged that software flaws in some of its antivirus products could allow malicious hackers to use denial of service (DOS) attacks to crash systems running the software, disrupting automatic protection features...

ISPs join to 'fingerprint' Internet attacks

Leading global telecommunications companies, ISPs (Internet service providers) and network operators will begin sharing information on Internet attacks as members of a new group called the "Fingerprint Sharing Alliance," according to a published stat...

Company backs off bounty for Mac OS X virus

A company that offered US$25,000 for the first virus that automatically spreads among Apple Computer computers running the OS X operating system cancelled the virus writing contest and retracted the offer of cash, citing concerns about legal liabilit...

BMC buys OpenNetwork for $18 million

Enterprise management software company BMC Software is continuing its identity-management buying spree, announcing that it is buying OpenNetwork Technologies, a maker of Web access management and single sign-on technology, for US$18 million in cash.

Symantec: spam, phishing grow, botnets shrink in '04

A new report released by security company Symantec found that incidents of online identity theft scams, also known as "phishing attacks," skyrocketed in the second half of 2004, as did spam and new software vulnerabilities. But other Internet blights...

Symantec: spam, phishing grow, botnets shrink in '04

A new report released by security company Symantec found incidents of online identity theft scams, also known as "phishing attacks", skyrocketed in the second half of 2004, as did spam and new software vulnerabilities. But other Internet blights, suc...

IDC: Gamers are gluttons for music, too!

Care for an MP3 with that frag? Companies that want to boost sales of music and portable music players should consider marketing to a growing, but untapped audience -- hard-core gamers -- according to the results of a survey by IDC and IGN Entertainm...

RFID crack raises spectre of weak encryption

With a little bit of technical acumen and a few hundred dollars, enterprising thieves can walk away with some late model cars and gas them up for free to boot, according to research published by computer security experts at The Johns Hopkins Universi...

Most Popular Reviews

Join the newsletter!

Error: Please check your email address.

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?