Schmidt: Private Sector Key to Stopping Google-style Attacks
Recent attacks against Google point to a danger White House Cybersecurity Coordinator Howard Schmidt says we must confront. But the key to victory is not in the government. (See related articles under the Latest Headlines section to the right.)
Read More ...
Photographers to sue Google over book scanning
Google's years-long attempt to create an online library and store with millions of books will face yet another legal hurdle with the filing of a class-action copyright infringement lawsuit by the American Society of Media Photographers.
Read More ...
NetSuite rolling out 'codeless' customization tool
NetSuite customers and partners have long been able to make tweaks to the on-demand ERP (enterprise resource planning) suite, but on Wednesday the vendor unveiled a new tool called SuiteFlow that could make the work easier.
Read More ...
China Mobile seeks Android apps for its Ophone
The head of China Mobile's research center on Wednesday urged mobile application developers in Taipei who work on Android apps to tweak and sell them to China Mobile's Ophone users as well.
Read More ...
Think tank in Estonia ponders war in cyberspace
When one nation launches a missile at another, it's easy to pinpoint the aggressor. But during a cyber attack, the aggressor may not be so identifiable, and the traditional rules of warfare don't quite fit.
Read More ...
Estonia readies for the next cyberattack
Jaak Aaviksoo knows first-hand what a cyberwar might feel like. In April 2007, Estonia's banking, media and government presence online was disrupted by several waves of distributed denial-of-service attacks that knocked services offline.
Read More ...
The future of MySQL in a post-Sun world
Oracle's control of the MySQL copyright could create new licensing headaches and bundling limits for customers
Read More ...
Don't be fooled: Windows Phone 7, Silverlight are business-ready
Despite the consumer focus of Microsoft's marketing, developers see enterprise uses for these graphically rich technologies
Read More ...
iPad security for the enterprise still subject to debate
Whether the iPad is secure enough for enterprise use is debatable, based on a survey of several analysts and experts.
Read More ...
Botnets 'the Swiss Army knife of attack tools'
Hacker militias may be at the bottom of the cyberwar food chain, but when they want to hit a target, they can mobilize botnets that are already up and running, security experts say.
Read More ...
No comments:
Post a Comment