Chase Card Services dumps customer details ... Samsung site hijacked as malware host
Today's IT News Audio Update
HP accessed reporters' phone records in leak search ... Intel launches vPro ... EU legislators warn Microsoft sanctions may hurt European businesses
News: Chase Card Services dumps customer details in landfill
News: Samsung site hijacked as malware host
News: HTC unveils Windows smart phone line-up
News: Reporters' phone records accessed in HP probe
Opinion: Menu Option Judo
ITwhirled: Ten MySQL best practices
Samsung site hijacked as malware host
The U.S. corporate website of Samsung Telecom has been hijacked and used to host and distribute malware, security vendor Websense has revealed.
HTC unveils Windows smart phone line-up
High Tech Computer Corp. (HTC), the largest maker of handsets that use Microsoft Corp. software, has launched four new smart phones including one that's designed to rival the BlackBerry.
Amazon opens video download store
Amazon.com Inc. unveiled the Unbox Video Store on Thursday, a direct rival to Apple's iTunes 24-7 video store, which allows U.S. users to buy or rent TV shows, movies and other video content from the Internet.
Reporters' phone records accessed in HP probe
Hewlett-Packard Co. obtained the telephone records of nine reporters as part of its internal probe of information leaks, the company confirmed Thursday.
U.S. court halts alleged Web site billing scheme
A U.S. district court has ordered a halt to an operation that allegedly added unauthorized charges to the phone bills of small businesses and nonprofit groups for Web sites services that, in many cases, they didn't know they had and didn't request, the U.S. Federal Trade Commission (FTC) said.
Apple notes intermittent MacBook shutdowns
Apple has published a terse note effectively requesting feedback relating to reports of intermittent shutdowns affecting MacBooks. While not all users are affected by this, Apple's technical note urges users who are to "contact AppleCare for service."
Menu Option Judo
By Sean McGrath
One of the distinguishing features of Judo as a martial art is that it emphasizes how you can use the weight of your opponent to your own advantage.
Hold that thought.
Now, close your eyes - no wait, that won't work - just imagine that you are a computer program skilled in the arts of Judo. Your 'opponent' is a user who is seeking to find errors in your coding. Bugs in the algorithms that make up your innermost being. The user's starting point every day is that you - the application - are always at fault. The user demands to be always right, even if, from your perspective as a logical computer program, the bugs lies within the user, not within your software. No amount of gently prodding the user to read the manual or take a training course appears to help. You seek to defend yourself against these never ending attacks. How to proceed?
Read the full article here
She's a 10
10 worst blockbusters of all time ... 10 best practices for avoiding ID theft ... The 10 best Will Ferrell skits ... Ten MySQL best practices ... Top 10 wine lists in New York City