|
LG, Samsung under investigation for Kodak patent infringement
The U.S. International Trade Comission is investigating a complaint by Kodak charging LG and Samsung with patent infringement.
Read more...
Judge denies most SAP motions to dismiss in Oracle suit
Danish IT fugitive Stein Bagger tells tabloid he embezzled after armed threats
Cisco sued for copyright infringement over Linksys router
Obama administration to inherit a real mess on Real ID
Restored DVD key to conviction in rape case
Sony BMG to pay $1M to FTC for COPPA violations
Apple code crashes, locks up Mac clones, Psystar claims
IT fugitive Stein Bagger will be sent back to Denmark
A brief tour of the software pirate underground scene
More Standards and Legal Issues Stories
Opinion: Red Flag Rules' Nov. 1 deadline postponed
The recent Wall Street meltdown sparked an outcry for new regulations to prevent another financial crisis. Congress is having hearings to lay the groundwork for a massive new set of laws, but most companies are woefully unprepared to meet any new e-discovery requirements.
Q&A;: Exchanging e-mails with a pirate
After a link to grisly photos of a child murder appeared on The Pirate Bay, the site -- known for letting users share files via the BitTorrent peer-to-peer protocol -- was embroiled in another controversy. Here IDG News Service interviews one of the site's founders about the controversy, an upcoming conference and BitTorrent file sharing in general.
Usenet: Not dead yet
Usenet, a source of community and file exchange for many long-term users, is now being targeted by some of the major ISPs. Is it on its last legs?
FAQ: Is your county posting your Social Security number online?
County and state Web sites may harbor Social Security numbers and other personal data in broadly accessible public records. Here's what you should know.
Mass. transit authority flaw disclosure: A student speaks up
One of three students involved explains the surprise he and his peers felt over the transit authority's response, why he thinks the flaw exposure was necessary and what the lesson is for future researchers.
The key to data security: Separation of duties
Separation of duties is a key control in finance, and it should be required in information security, too. It requires that no one person is able to compromise information.
Wi-Fi Warfare
Find unauthorized Wi-Fi access points on your network and secure them ASAP, warns Frank Hayes.
Norton Internet Security 2009 beta hits the accelerator
NIS 2009 has undergone a major overhaul in an attempt to reduce memory usage, enhance performance and provide a new level of safety.
How Secure is Secure Enough?
With a faltering economy beginning to put the squeeze on IT budgets, and security managers being asked to justify every dollar they spend, there is a growing need to come up with a better answer to the big question in security. Here are five steps for determining how secure is secure enough for your company.
Surveillance camera identifies people by race
An art project by a mechanical engineer with an art degree illustrates a disquieting possibility for surveillance cameras: The ability to make judgments concerning the race of those passing before it.
"Privacy groups have long worried about Google's privacy policies --- and now it appears that consumers have followed suit. Google..."
Read more "When all the terminals at this company suddenly stop responding, this pilot fish soon finds the problem's cause -- and..." Read more "The defunct McCain-Palin campaign is selling off the assets, and an investigative journalist from a FOX affiliate was able to..." Read more More Security Blogs See all Computerworld Blogs |
Virtualizing Microsoft Exchange Download now! |
For Congress to do anything that helps protect consumers and the critical Internet infrastructure as a whole, it must pass laws that require proactive processes to protect computers, not that tell people how to deal with the resulting mess, says Ira Winkler. Click here to read the latest column by Ira Winkler |
| ||
| ||
| ||
|
Stripping away the trappings of applications, systems and networks, information is the core asset of most organizations. Our columnist describes how asserting the importance of information governance is crucial to making that asset tangible, addressable and protected. Click here to read the latest column by Jon Espenschied |
About Us Advertise Contacts Editorial Calendar Help Desk Jobs at IDG Privacy Policy Reprints Site Map |
CIO The Industry Standard |