Worms Turn FasterWhew that was fast! Microsoft announced a vulnerability last Tuesday and by this weekend a worm was spreading that attacked it.August 15, 2005 by Richard Stiennon in Tech Industry
TPM is so much TP for AppleGee, what did that take, a week? Computing geniuses have already figured out how to break the impregnable security of Mac OS X for Intel processors.August 13, 2005 by Richard Stiennon in Apple
Keystroke logging is not SophisticatedThis article makes humorous use of the word "sophisticated". First it refers to a "sophisticated" keystroke logger installed on machines at Brigham Young University by student Esteban N.August 12, 2005 by Richard Stiennon in Security
Privacy and GoogleLast week, San Francisco-based News.com started putting a short note at the end of its stories on Google: ``Google representatives have instituted a policy of not talking with CNET News.August 10, 2005 by Richard Stiennon in Google
3,000 Security Professionals Can't Be WrongIn the "egg on the face" department this morning IBM had to retract an item made in their Global Business Security Index Report that 1.2 million cyber attacks originated in New Zealand.August 9, 2005 by Richard Stiennon in Security
Cisco + Nokia?In what would easily be the largest technology merger ever Cisco is rumored to be contemplating the purchase of Nokia. Nokia is worth $71 Billion compared to Cisco's $123 Billion according to Reuters.August 7, 2005 by Richard Stiennon in Microsoft
Blow by blow accountThere is an attorney who happens to be a prolific blogger that happened to be at Black Hat last week. It turns out she helped Mike Lynn through his hassles with Cisco and ISS.August 6, 2005 by Richard Stiennon in Tech Industry
Spear PhishingIt is pretty scary to think about a kid in Romania targeting *you* for a phishing attack. Imagine, he knows your address, your phone numbers, your spouses name, etc.August 5, 2005 by Richard Stiennon in Security
Apple on Intel has a rotten coreApple has succumbed to the lure of the Trusted Platform Module. The first development kits of OS X for Intel have been shipped.August 4, 2005 by Richard Stiennon in Apple
Connecting the dots with SOXFirst a brief summary of the Sarbane-Oxley Act.This law was passed by Congress in reaction to the exposed frauds at publicly traded companies that resulted in large losses for stockholders and the failures of many companies.August 4, 2005 by Richard Stiennon in Legal
Great Blog to readHere is one I am adding to my must-read list. From David Cowan at Bessemer Ventures.August 3, 2005 by Richard Stiennon in Tech Industry
Must read interview with Mike LynnGreat interview with Mike Lynn at Wired Magazine. Thanks to Kim Zitter for getting this out.August 1, 2005 by Richard Stiennon in Tech Industry
ISS Making enemiesNow ISS and Cisco are getting heavy handed. Read the...July 31, 2005 by Richard Stiennon in Tech Industry
Chertoff speaks outThe new Secretary of the Department of Homeland Security addressed the Commonwealth Club recently. I would have fallen asleep before he got to talking about cyber.July 29, 2005 by Richard Stiennon in Security
You Go Michael Lynn!It may be premature to chime in on the side of Michael Lynn, the ISS engineer that is causing the ruckus at Black Hat this week. But he is showing signs of martyrdom and could be come an Internet security hero.July 28, 2005 by Richard Stiennon in Cisco