Sunday, May 4th, 2008
Ars Technica's original Wireless Security Blackpaper was first published back in 2002, and in the intervening years, it has been a great reference for getting the technical lowdown on different wireless security protocols. As a sequel to the original blackpaper, we wanted to do something a little more basic and ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Saturday, May 3rd, 2008
Microsoft has dropped its nearly three-month-long pursuit of Yahoo, ending a historic acquisition attempt whose failure takes Microsoft back to square one in its quest to boost its online business to better compete against Google.
"We continue to believe that our proposed acquisition made sense for Microsoft, Yahoo and the market ...
Posted in General BS, Internet | No Comments
Saturday, May 3rd, 2008
Google Adwords account holders are being targeted by criminals out to trick them into handing over credit card information using a clever URL spoof that has gained popularity in recent weeks.
On the face of it, the scam follows a traditional attack route involving the sending of spam e-mail to random ...
Posted in Internet, Privacy, Security | No Comments
Friday, May 2nd, 2008
The developers of the PHP scripting language have issued Version 5.2.6, which fixes numerous bugs and plugs some security holes. The changes are comprehensive, including bug fixes to modules that link to third-party products. PHP 5.2.6 also rectifies several flaws that could have caused a crash.
The developers have eliminated errors ...
Posted in Coding, Internet, PHP, Security | No Comments
Thursday, May 1st, 2008
As if computer viruses and worms aren't enough of a nuisance, malicious hardware, which will be much more difficult to detect, could soon become a threat too.
Today, computer viruses, which are programs downloaded either as an email attachment or when someone visits a website, are responsible for most computer attacks. ...
Posted in Hardware, Internet, Privacy, Security | No Comments