3rd June 2007 Archive
Browse by publication date, or search the site.
Analysis With four in the last week, is Google the next security buffoon?
Google's desktop search application is vulnerable to an exploit that allows a determined attacker to remotely run most programs installed on a victim's machine. The flaw is one of at least four security holes to visit Google this past week, demonstrating that the search king, despite the god-like aura it enjoys for its pleasing …
Applications 3 Jun 2007, 01:52
So how much is a vuln worth... and who's buying?
Two years ago, Charles Miller found a remotely exploitable flaw in a common component of the Linux operating system, and as many enterprising vulnerability researchers are doing today, he decided to sell the information. Having recently left the National Security Agency, the security professional decided to try his hand at …
Enterprise Security 3 Jun 2007, 08:02
Analysis Long-planned escape from beige boxes
Microsoft's announcement of Surface Computing, basically a PC built into a coffee table, might indeed represent a new paradigm in computing technology, but for Microsoft it's just another attempt at getting its software out from the beige boxes under our desks to somewhere, anywhere, else. Microsoft long ago came to dominate …
Operating Systems 3 Jun 2007, 09:02