Profile of Thomas ClaburnEditor at Large, Enterprise Mobility
Member Since: 11/15/2013
News & Commentary Posts: 4491
Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.
Articles by Thomas Claburn
posted in December 2007
Researchers with the Identity Theft Resource Center cited 443 breaches in the U.S. in 2007 in their annual report, compared to the 315 they identified in 2006.
The issue was acknowledged in October, when Microsoft warned "not to copy data files that contain alternate data streams to Windows Home Server shared folders."
The Web-based service, dubbed Glide, offers 2 Gbytes of storage with its free accounts.
People who author malware are part of a thriving underground economy that's expected to grow in 2008, according to computer security researchers.
The attack worked because the social networking site allowed users to embed Flash content in their scrap posts.
Grisoft seeks info on companies that promoted counterfeit AVG antivirus products through sponsored text ads.
Think Secret, the target of an Apple lawsuit to find out who leaked information to the site, has announced that it has reached a settlement with Apple at the cost of its existence, though not its integrity. Nick Ciarelli, publisher of Think Secret, said the site will close.
Many of those affected are puzzled that Microsoft would recommend editing the Windows registry rather than fixing and reissuing the patch.
If you visit a malicious site using Firefox 3, it will block the site and do it with a user interface that doesn't allow a click-through, say company executives.
BitDefender says a new Trojan replaces Google AdSense text ads with ads from a different, potentially malicious provider.
If exploited, the vulnerabilities could allow remote code execution, denial of service, data exposure, cross-site scripting, privilege escalation, and file deletion.
Facebook is suing companies and people that it says tried to harvest personal information about its users.
The Pew survey found that 60% of Internet users say they are not worried about how much information about them is available online.
It's not every day that the U.S. government files a lawsuit against an Apple iPhone. I noticed the lawsuit over the weekend and started looking into it, thinking at first that the government might be taking action against Apple's decision to offer the iPhone exclusively through AT&T.
While the S3 Web service is designed to store large objects or files, Amazon's new SimpleDB is optimized for storing smaller bits of data and accessing that data swiftly.
Privacy implications top a ranking congressman's concerns, while potential conflict of interest is on the minds of online rights groups.
Google uses AskEraser data to fight click fraud and to present contextually relevant ads, but should you be worried?
US-CERT is warning the weaknesses may allow an attacker to execute remote code without additional user interaction.
Among other features, the software will remove worms and viruses that affect only PC users from Mac e-mail to prevent the user from passing malicious files on.
Workers and other insiders admit to risky behavior -- such as accessing corporate e-mail from Wi-Fi hotspots -- in a survey by security firm RSA.
The critical vulnerabilities patched this month exist in Microsoft DirectX, Windows Media File Format, and Internet Explorer.
Blogger, MySpace, and Facebook can provide an easily accessible place to store stolen data until it can be collected and deleted, security researchers warn.
Symantec also sees spammers trying new techniques, such as spamming via bot-net, audio and video spam, and spamming using protocols for IM, SMS, and online games.
No classified information was lost but the personal information of visitors may have been stolen from the Oak Ridge National Laboratory.
The alert warns of a buffer overflow vulnerability in the Cisco Security Agent (CSA) for Windows, with remote code execution as the possible outcome.
The Web site houses open source code and demos from Google's Apple-oriented engineers.
Analysts with F-Secure and Websense predict an explosive growth of malware, bot attacks, QuickTime exploits, and viruses that target the iPhone.
Google's iPhone home screen makes services such as Gmail, Calendar, and Reader more accessible through the use of Ajax menu tabs.
The lists were edited to remove adult-oriented queries and common searches, like "weather," that prove perpetually popular.
Some malware authors have even gone so far as to include the phrases "no worm, no virus" in the e-card's text, as if such an assurance made the message safe.
The vulnerability was patched in 1999 but has since resurfaced in subsequent versions of Windows.
Currently, Microsoft penalizes Windows Vista users who fail to activate their operating system software within 30 days.