Profile of Thomas ClaburnEditor at Large, Enterprise Mobility
Member Since: 11/15/2013
News & Commentary Posts: 4491
Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.
Articles by Thomas Claburn
posted in November 2007
The compromised server was associated with USAID's Tanzania subdomain, Tanzania.usaid.gov.
The teen's botnet group is responsible for taking control of more than 1 million computers through the use of malware, the FBI alleges.
The winner of the auction will have to pay at least $4.6 billion for the so-called "C Block" portion of the spectrum.
The company has filed lawsuits in Florida against several individuals and a handful of domain name companies for typosquatting more than 1,100 domain names.
The FBI says that since June, eight individuals have been indicted, plead guilty, or were sentenced for criminal activity related to botnets.
In its Experimental Search test, Google users can add, move, and remove search results returned by their queries.
The flaw exists because Lotus Notes displays an icon associated with the attached file's extension rather than its MIME Content-Type header.
Defaced versions of AppleMatters.com and iPhoneMatters.com were hoaxes, but real Mac-specific hacks are widely expected as Apple gains market share.
Sunbelt Software said many search results on Google led to malicious Web pages that expose visitors to exploits that can compromise vulnerable systems.
Ads for Adobe PDF Powered by Yahoo allows publishers to generate ad revenue from their digital content.
Other costs include reputation fixes and customer support in the form of information hotlines and credit monitoring subscription for victims, according to a new survey.
The vulnerabilities could be used to gather sensitive data from sites in other windows or inject data or code into those sites, Mozilla said.
For example, Microsoft Office vulnerabilities spiked 300% this year primarily because of the new Excel vulnerabilities, the SANS Institute survey found.
A consultant's lost laptop includes names, Medical Care Plan numbers, age, sex, physician and test results for infectious diseases, including HIV and hepatitis.
The exploit requires that the victim is duped into clicking on a Web link in an e-mail message or on a Web page that points to what appears to be a media file.
The fix addresses a Java Archive handling bug that could allow a malicious attacker to hide exploit code in a .jar file.
The incident marks the second significant attack on Monster.com in recent months.
The security flaw could create an e-mail attachment that executes malicious code when clicked on.
The company now offers 20 interactive games that command as much time as the average Internet session.
Improvements include Web Page Forgery Protection, clearer SSL Error messages, automatic plug-in checking, and compliance with Windows Vista parental controls.
The increasing sophistication of computer chip design raises the risk that undetected bugs could be used to crack public key encryption systems, security luminary Adi Shamir says.
The U.S.-China Economic and Security Review Commission claims espionage is used to save China the time and cost of researching and developing its own advanced technologies.
Amazon is apparently planning to release a $399 e-book reading device called Kindle on Monday. I'd have thought that Amazon CEO Jeff Bezos would know better since he was around at the turn of the century, during the first e-book flop.
Data breaches, Vista, spam, and the professionalization of cybercrime top the security firm's list of the year's security perils.
The service's main new feature is the OneCare Circle, which links PCs together over a wireless connection to make them manageable from a single place.
The download also improves reliability when using VMware's Fusion and synchronization between iPhone and Yahoo address books.
McAfee also is predicting a 50% increase in VoIP attacks in 2008, compared to this year.
The affected areas of campus have since been reopened.
The guide is a set of documents and software to help organizations secure one of the world's most popular set of applications.
Lexical data analysis for e-mail messages and attachments is now available to Postini E-mail Security and Google Apps Premier Edition customers.
Out of the 10.8 million in the UK signed up for social sites, one in four have posted confidential or personal information, according to "Get Safe Online."
The L.A. man known as "acidstorm" admits he assisted in creating a network of compromised computers that he helped control through IRC commands for more than a year.
The Security Bulletins mostly impact non-Microsoft Windows Vista products, but analysts warn against complacency.
The English-language version of the newspaper contains 434 malicious scripts, binaries, cookies, and images, according to a ScanSafe report.
One fix addresses a "critical" issue and one addresses a flaw rated "important," and neither is needed for Windows Vista.
The defendants are charged with participating in a multinational, Internet-based criminal enterprise that trafficked in stolen credit card data and personal information.
Visiting the page exposes the visitor to an exploit that installs malware unless the user is fully patched against the most recent security vulnerabilities.
Shortly after he began working for a rival company, Gary Min uploaded some 180 DuPont documents to his new corporate laptop.
More than half of the agency officials queried were concerned about bots and spyware, security breaches, and inadequately trained users.
Trend Micro claims that as game consoles with Web browsers proliferate, so too will security problems. To date, however, such risks remain largely theoretical.
Vontu's acquisition fits in with analysts' valuation of a data leak prevention market that is expected to jump to as much as $150 million this year.
Gates was named by 84% of the participants, Jobs by 73%, and Dell by 53% of CompTIA voters.
The two companies offer fixes for vulnerabilities that could give hackers elevated privileges to a networked computer.
Facebook and MySpace, the two largest social networks, are giving advertisers better tools to reach their predominantly youthful audience.
Apple, AT&T, Microsoft, Nokia, Palm, RIM, Symbian, and Verizon are absent from Google's coalition focused on a Linux-based software platform for mobile phones.
With the commencement on Thursday of a Federal Trade Commission Town Hall meeting, "Ehavioral Advertising: Tracking, Targeting, and Technology," The Center for Digital Democracy (CDD) and the U.S. Public Interest Research Group (US PIRG), two public interest advocacy groups, again asked the FTC to investigate and regulate online marketing.
The two groups filed a 74-page supplemental statement that expands u
The program is designed to recalibrate a customer's compliance and security offerings across IBM's five domains of information technology security.