Profile of Thomas ClaburnEditor at Large, Enterprise Mobility
Member Since: 11/15/2013
News & Commentary Posts: 4491
Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.
Articles by Thomas Claburn
posted in October 2007
The Trojan, OSX.RSPlug.A, represents one of the relatively few Mac exploits to be spotted in the wild.
An Israeli news site claims Bin Laden's cyber legions are retaliating against Western surveillance programs.
Google's upcoming APIs are expected to help build social applications that will work across social networking and other Web sites.
Trend Micro says new malware is tempting computer users to enter CAPTCHA codes to remove clothing from the image of a model.
The new look has been made available to about 1% of all Gmail users and is being rolled out to the rest on an ongoing basis.
While the e-mail includes the FTC seal, it has grammatical errors, misspellings, and incorrect syntax.
In writing an article about how hackers had gotten Apple's new Leopard operating system to run on PCs, I corresponded with the individual responsible for posting a how-to-guide for creating a "hackintosh."
The person who posted the how-to-guide goes by the forum name BrazilMAC and since he responded to my query at length, it seemed appropriate t
Hackers also have been busy opening the locks Apple closed with its most recent iPhone patch.
Jason Michael Downey used an IRC account to compromise PCs to attack and subvert other computers and increased the size of his bot network to about 6,000 machines.
Trevor Darnborough, whose company, Darnbro, filed for a patent on securing RFID tags to clothing, hopes other schools will be interested.
Security software engineers with Sipera have found flaws in Vonage's VoIP Motorola Phone Adapter, its Grandstream HandyTone-488, and its Globe7 VoIP Client.
Google today began giving its Gmail users access to IMAP, an e-mail protocol that allows users to synchronize their e-mail across multiple devices.
While Google's announcement is likely to be appreciated by users of Apple's iPhone (which supports IMAP) and business users, what's particularly noteworthy about the news is how Keith Coleman, Gmail product manager, describes Google's intentions.
ElcomSoft's patent describes a way for a GPU and CPU to decrease the amount of time required to recover forgotten passwords
The vulnerability affects Adobe Reader 8.1 and earlier, Adobe Reader 7.0.9 and earlier, and a handful of Adobe Acrobat Professional versions.
Three previous uses of the exploit that took down the multiplayer science fiction game have been identified; no personal information or credit card numbers were exposed.
With the help of a Secret Service case review, a Utica College study finds the median actual dollar loss for identity theft victims was $31,356.
For those using Microsoft Internet Explorer, visiting a malicious Web page could result in a compromised computer.
Authorities used computer forensics to find and arrest a teenager who allegedly made a false 911 call that resulted in a homeowner staring into the barrels of a SWAT team's assault rifles.
The possibility that the United States might lose its edge in technology and research represents one of the greatest risks to national security, claims a former U.S. undersecretary of defense.
Unusual redirects to Chinese search engine Baidu this week may be coinciding with protests against the Dalai Lama's warm reception in Washington.
Computer researchers suggest several methods that can be used to attack the "reputation systems" used by hackers to conduct business.
MP3 audio spam pitching a company called Exit Only is flooding the Internet, say security firms.
Pretending to be the plug-in, the PWS-Pykse Trojan is similar to the 32/Pykse.worm in that it depends on tricking victims into executing the malicious code.
Apple CEO Steve Jobs explains the SDK shipping in February will help third-party partners and protect iPhone users from malicious programs.
HP Secure Print Advantage consists of software and hardware designed to harden organizations' printing infrastructure against attacks and to protect potentially sensitive information.
The social networking site said it will comply with an independent safety and security examination to report on Facebook's compliance for two years.
The technology is designed to let content owners prevent YouTube users from uploading copies of their videos, or they can have the choice of monetizing unauthorized uploads with ads.
A security researcher says attacking VoIP devices over SIP can be difficult, but many of the devices have embedded Web servers that can be hacked using a buffer overflow exploit.
Version 7.5 adds the ability to test Web applications for SQL Injection and Remote File Inclusion vulnerabilities, two of significant areas of concern for Web applications.
Spammers Kilbride and Schaffer will also forfeit more than $1.1 million in illegal proceeds from their spam operation.
The 2007 National Strategy for Homeland Security focuses on the "uninterrupted use of the Internet and the communications systems that comprise our cyberinfrastructure."
The update includes 27 security fixes for the Oracle database, 11 for the Oracle Application Server, and eight for the Oracle E-Business Suite.
Security professionals and bloggers suggest a hacker going by the name Alexey Tolstokozhev may never have existed.
The latest trend in social engineering actually installs Trojans on a PC instead of eliminating them, McAfee security researchers found.
Symantec researchers said they were tipped off when they realized the malware document wasn't in OLE format.
The millimeter wave scanning system being tested at Phoenix Sky Harbor Airport can see through clothing to detect weapons, explosives, and other objects.
Instead of busing to the Googleplex, local engineers can save anywhere from an hour to two hours a day that would have otherwise been spent on the road.
Risks include the dissemination of misinformation, fraud, phishing, malicious code, and the invasion of privacy, according to Symantec analysts.
The flaw could allow an attacker user-level access to execute remote commands on Citrix servers.
The FTC has filed a complaint against several individuals seeking to halt e-mail messages promoting weigh loss and anti-aging products.
Improvements let companies see single-line results from apps like Salesforce.com, EMC Documentum, IBM FileNet, OpenText Livelink, and Microsoft SharePoint.
Many of the vulnerabilities addressed by the fixes could be exploited if a Windows user simply clicks a malicious Web link.
Publishers can earn revenue from companion ads, which sit atop the video window like banner ads on a Web page, and text overlay ads, which occupy the bottom 20% of the video frame.
The kit includes the IBM Mashup Hub, a mashup server that stores RSS, Atom, or XML data feeds and allows them to be merged, transformed, filtered, or otherwise manipulated.
Cool Software is intended to provide Intel with market intelligence rather than to foster a community.
To prepare students "to harness the potential of modern computing systems," the companies will provide universities with hardware, software, and services to advance training in large-scale distributed computing.
MSNBC is following in the footsteps of other media companies that have bought into socially-oriented Web sites and blogs, including Conde Nast, CNET, News Corp.
Zara, a Spanish clothing chain, has developed an analytical model to optimize the distribution of inventory across its stores with help from some brains at MIT and UCLA.
Danny Williams wasn't injured as a result of the trouser conflagration. The iPod, alas, perished in the fire.
The companies will use Yahoo's Domain Keys technology to block e-mail messages that claim to come from eBay or PayPal but really originate elsewhere.
Despite its current iTunes retail model, a 2006 patent application shows that Apple has been developing the technical infrastructure for a subscription service for digital content.
Reports are swirling that Bungie Studios, the game developer responsible for the Halo series, the Myth series, and other good things, has arranged to buy back its name from Microsoft and part ways.
Performance Pricing alleges that Google AdWords, AOL Search Marketplace, Microsoft adCenter, and Yahoo Search Marketing all violate its "competitive bidding" patent.
Google plans to begin offering policy management and message recovery services for business customers using Gmail as part of their Google Apps Premier Edition subscriptions.
The acquisition is expected to enhance Microsoft's online search products with Jellyfish's social shopping search service and "Value Per Action" compensation.