The ABCs of securing your wireless network

Sunday, May 4th, 2008

Ars Technica's original Wireless Security Blackpaper was first published back in 2002, and in the intervening years, it has been a great reference for getting the technical lowdown on different wireless security protocols. As a sequel to the original blackpaper, we wanted to do something a little more basic and ...

Microsoft Abandons Yahoo Acquisition

Saturday, May 3rd, 2008

Microsoft has dropped its nearly three-month-long pursuit of Yahoo, ending a historic acquisition attempt whose failure takes Microsoft back to square one in its quest to boost its online business to better compete against Google. "We continue to believe that our proposed acquisition made sense for Microsoft, Yahoo and the market ...

Phishers Mimic Google Adwords

Saturday, May 3rd, 2008

Google Adwords account holders are being targeted by criminals out to trick them into handing over credit card information using a clever URL spoof that has gained popularity in recent weeks. On the face of it, the scam follows a traditional attack route involving the sending of spam e-mail to random ...

PHP 5.2.6 plugs security holes

Friday, May 2nd, 2008

The developers of the PHP scripting language have issued Version 5.2.6, which fixes numerous bugs and plugs some security holes. The changes are comprehensive, including bug fixes to modules that link to third-party products. PHP 5.2.6 also rectifies several flaws that could have caused a crash. The developers have eliminated errors ...

Malicious hardware may be next hacker tool

Thursday, May 1st, 2008

As if computer viruses and worms aren't enough of a nuisance, malicious hardware, which will be much more difficult to detect, could soon become a threat too. Today, computer viruses, which are programs downloaded either as an email attachment or when someone visits a website, are responsible for most computer attacks. ...