A New Way To Foil Keyloggers?

PC Tools has released a new version of Spyware Doctor, 3.2, with what it calls “groundbreaking Keylogger Guard technology that protects users from identity thieves”. A press release says: Existing solutions can allow keylogger threats to run undetected for weeks or months by which time the damage is already done. Spyware Doctor 3.2’s Keylogger Guard detects …

Continue reading ‘A New Way To Foil Keyloggers?’ »

What’s The Difference Between A Search Engine, A Search Destination And A Portal?

LookSmart has today unveiled some more focused search engines, according to a press release from the company: It calls them ‘vertical search destinations’ to ‘provide niche audiences with essential search results, versus the typically exhaustive returns from other search engines’: the trendy www.teenja.com for teens; the more studious www.gradewinner.com for “tweens;” and www.24hourscholar.com for college …

Continue reading ‘What’s The Difference Between A Search Engine, A Search Destination And A Portal?’ »

News, And Tumbling Words

An interesting way of looking at news: 10×10 / 100 Words and Pictures that Define the Time / by Jonathan J. Harris: Every hour, 10×10 scans the RSS feeds of several leading international news sources, and performs an elaborate process of weighted linguistic analysis on the text contained in their top news stories. After this …

Continue reading ‘News, And Tumbling Words’ »

OK, That’s Enough Bluetooth Monday Jokes

One of my favourite bands from the early 1980s, New Order, are promoting their upcoming album, Waiting for the Sirens Call, (due to be launched this coming week) via Bluetooth. They are displaying, in the words of Engadget: digital interactive posters offering song clips, ringtones and photos that can be beamed directly to fans’ cellphones. …

Continue reading ‘OK, That’s Enough Bluetooth Monday Jokes’ »

Sparking The Wi-Fi Revolution

Glancing at the charts on JiWire’s newlook website of the top 10 Wi-Fi countries and cities, I wondered whether it was worth taking a closer look at the figures to see if there’s any conclusions we could draw about the wireless revolution. The figures only include those commercially available hotspots, as far as I can …

Continue reading ‘Sparking The Wi-Fi Revolution’ »

Phishing Your Yahoo! Account

More evidence that phishers are widening their net. Munir Kotadia of ZDNet Australia reports that Yahoo’s free instant-messaging (IM) service is being targeted by phishers in an attempt to steal usernames, passwords and other personal information. Yahoo confirmed on Thursday its service was being targeted by a phishing scam. According to the search giant, attackers …

Continue reading ‘Phishing Your Yahoo! Account’ »

Where Did That Email Come From?

An interesting new tool from the guys behind the controversial DidTheyReadIt?: LocationMail. (For some posts on DidTheyReadIt, check out here, here, here and here.) LocationMail tells you where e-mail was sent from. It uses the most accurate data in the world to analyze your e-mail, trace it, and look up where the sender was when the message …

Continue reading ‘Where Did That Email Come From?’ »

Skype Me And A Return To Innocence

Great piece today in The New York Times: ‘Internet Phone Service Creating Chatty Network’ on the openness of Skype users using the SkypeMe function to chat, and be chatted to, by strangers with only a nice chat in mind: Skype users report unsolicited contacts every day, and contrary to such experiences with phone and e-mail, …

Continue reading ‘Skype Me And A Return To Innocence’ »

Your MP3 Player As Your Phone

I’m not convinced that this gadget is exactly the wonder it claims to be, but it’s an interesting fusion of functions. The soon-to-be-launched Ezmax MP3 Player includes a VoIP feature that, in the words of PC World’s Paul Kallender when the device is linked to an Internet-connected PC via a USB 2.0 port, people can make local …

Continue reading ‘Your MP3 Player As Your Phone’ »

The Vulnerability Of VoIP

Listened to an interesting talk by Emmanuel Gadaix of the Telecom Security Task Force at the Bellua Cyber Security Asia 2005 conference in Jakarta. Emmanuel spoke of the security threats to mobile telephony, and while he pointed to the weakness of SS7 signalling — the part of mobile telephony where networks talk to one another — …

Continue reading ‘The Vulnerability Of VoIP’ »