Lenovo Patches Networking OS Vulnerability Dating Back to 2004


A bug in Lenovo’s Enterprise Networking Operating System could allow an attacker to launch an authentication bypass attack. Vulnerabilities Web Security authentication bypass BladeCenter ENOS Enterprise Networking Operating System Lenovo OS Vulnerability RackSwitch

Old-School Bagle Worm Spotted in Modern Spam Campaigns


date back to 2004. Bagle.A and Bagle.B Malware Bagle beagle Comodo Malware analysis Spam campaigns


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

States Need Way More Money to Fix Crumbling Voting Machines

WIRED Threat Level

“We are driving the same car in 2019 that we were driving in 2004, and the maintenance costs are mounting,” one South Carolina election official told researchers. Security


DXC Technology


One year into the Hightail and OpenText collaboration

OpenText Information Management

Founded in 2004 as YouSendIt, Hightail was originally designed to help individuals and businesses easily and securely transfer large files from one person to another.

Investigative Satirist Paul Krassner Interviewed by Steve Post

Archives Blogs

In 2004 WNYC host Steve Post spoke with Krassner, whom he described as “a kind of counter-cultural renaissance man.” This program was first broadcast on June 5, 2004 as a No Show special. . Satirist Paul Krassner passed away this past Sunday. ” Writer, publisher editor, activist, psychedelic explorer, and concert violinist, Krassner considered himself an investigative satirist.


This is the old ChiefTech blog.: The Search for Application Perfection


Sunday, 16 December 2007 The Search for Application Perfection Back in 2004 I co-authored an article that asked, does the perfect intranet exist ? This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

Sophos Sandboxie is now available as an open-source tool

Security Affairs

” The sandbox was developed by Ronen Tzur and released on June 26, 2004, he sold the solution to Invincea in 2013. Sophos announced the public release of the source code of the sandbox-based isolation program Sandboxie.

eNotes: If you build it they will come…15 years later


In April of 2004, MERS announced the launch of the eRegistry, the system that would be the holder for the eNote controller and location. Over the next few years providers began establishing a market space for eSign, electronic form creation, and eVault capabilities.

Paper 52

Here’s a Story Where Picking the Right Font Was Never More Important: eDiscovery Trends

eDiscovery Daily

Here’s the problem: the farm declaration, dated 2004, was written in Calibri, while the cottage declaration, dated 1995, was written in Cambria. This is a story that a word geek like me can really appreciate.

The PCLOB Needs a Director

Schneier on Security

The PCLOB was established in 2004 (when it didn't do much), disappeared from 2007-2012, and reconstituted in 2012. The US Privacy and Civil Liberties Oversight Board is looking for a director. Among other things, this board has some oversight role over the NSA.

IT 62

Steven Sauer to Lead Toshiba Business Solutions

Document Imaging Report

to Toshiba in 2004, Sauer became president of TBS New York. . Toshiba Executive & Industry Veteran Becomes. President of the Company’s Direct Sales Operation . . LAKE FOREST, Calif.,

Sales 52

Mozilla offers bigger rewards for Firefox flaws under its bug bounty program

Security Affairs

Mozilla announced some major changes to its bug bounty program that was first launched in 2004. Mozilla announced some changes to its Firefox bug bounty program, it promises bigger rewards for vulnerabilities and will accept duplicate reports if necessary.

IT 101

Up to Georgia 2,000 websites have been hit by cyber attacks

Security Affairs

” Mikheil was the third President of Georgia for two consecutive terms from 25 January 2004 to 17 November 2013. A wave of cyber attacks hit 2,000 websites in Georgia, including the sites of the president, courts, and local media.

Facebook: is it time we all deleted our accounts?

The Guardian Data Protection

Back in 2004, when a 19-year-old Zuckerberg had just started building Facebook, he sent his Harvard friends a series of instant messages in which he marvelled at the fact that 4,000 people had volunteered their personal information to his nascent social network.

IT 114



Questions as to the Kaspersky antivirus software company were raised by military intelligence in 2004, well before the 2013 threat assessment issued Pentagon-wide. “Russian Firm Was Long Seen as Threat,” The Wall Street Journal , November 18, 2017 A2. Who dropped the ball? Did the Russians have an inside track? IT Security Information Value Governance Communications Duty of Care Controls Oversight Access Duty Government Supervision

The Great $50M African IP Address Heist

Krebs on Security

That individual — Ernest Byaruhanga — was only the second person hired at AFRINIC back in 2004.

Mainframes, Freight Trains and Education Pains

Rocket Software

To be fair, I was in school in the early aughts, from 2001 to 2004; this type of talk was fully accepted. By David Robertson , guest blogger. When I was in college, I had an instructor that, for all intents and purposes, was viewed as a relic.

A sad story of pedophilia on how disgusting images fed the web

Security Affairs

This is the story of the LS-Studios, by Alexander Chursin , who had to close his business in 2004 after an FBI raid. The journalist Livio Varriale sheds the light on a story about pedophilia that starts from afar and still today finds its roots in the darker side of the internet.

NEW TECH: CyCognito employs offensive bot network to put companies a step a head of attackers

The Last Watchdog

I first wrote about criminal botnets at USA TODAY in 2004. When it comes to defending their networks, most companies have had it drilled into them, by now, that it’s essential to erect layered defenses.

The role of a secret Dutch mole in the US-Israeli Stuxnet attack on Iran

Security Affairs

In 2004, CIA and Mossad requested help to the the Dutch intelligence to get access to the plant, only in 2007 the mole, who posed as a mechanic working for a front company doing work at Natanz, dropped the virus into the target systems. “[T In 2004, Mossad and the CIA asked for help from AIVD.

US will help Baltic states to secure baltic energy grid

Security Affairs

The three states joined both the European Union and NATO in 2004, but they are still part of a power grid controlled by Russia. The United States and Baltic announced cooperation to protect the Baltic energy grid from cyber attacks as they disconnect from the Russian electricity grid.

Kazakhstan wants to intercept all HTTPS Internet traffic of its citizens

Security Affairs

The certificates are issued in compliance with the Law on Communications 2004 passed in November 2015. Bad news for citizens of Kazakhstan, the government is beginning to intercept all the encrypted traffic, and to do it, it is forcing them to install a certificate.

New materials available in DigiNole highlight Integration statue.

Archives Blogs

The photographs were taken from events at Heritage Day 2004, during which a statue celebrating integration was unveiled on campus. FSU alumni Doby Flowers holds up a bronze rose presented to her by sculptor W. Stanley “Sandy” Proctor (left).


Q&A: How cutting out buzzwords could actually ease implementation of powerful security tools

The Last Watchdog

Having covered tech security since 2004, I can attest that there is plenty of room for more clarity, and less hype, in security products marketing. The central dilemma posed by digital transformation is this: How do companies reap the benefits of high-velocity software development without creating onerous security exposures? Related: Golden Age of cyber spying dawns.

Facebook Files, Initial Thoughts

John Battelle's Searchblog

Not since Google’s 2004 filing have so many journalists sped-read one document at the same time, eager to glean any possible insight unique to their particular point of view or publication and rush to post it before anyone else. Yes, I’m one of those journalists, I suppose, but I know I have to read this thing for any number of reasons, so I may as well use the race as an excuse to force myself into action.

IT 64

Predictions 2012: The Roundup

John Battelle's Searchblog

2004 Predictions. 2004 How I Did. ( image ) As promised, here are all my predictions in one place. I’ve written a brief overview of each as well. Predictions 2012: #1 – On Twitter and Media.

IT 85

COVID-19 and the Importance of the Digital Workplace


And as a full-time remote worker since 2004 myself, including more than 9 years at AIIM, I think I have some unique insights I can share on how to make your digital workplace successful.

Congrats AOL

John Battelle's Searchblog

Read my rant asking Time Warner to set it free back in March of 2004 here AOL was finally set free today , years after it should have been. Congrats to the AOL team and Tim Armstrong, and I imagine, to the Time Warner folks who managed to destroy so much value by blaming everything on the merger in the first place (sure, it was a bad deal, but man, AOL was not the reason Time Inc. went south!).

IT 40

Emoji Are Showing Up in Court Cases More and More: eDiscovery Trends

eDiscovery Daily

Here’s a chart from Goldman, showing the rise of cases since 2004: By the way, you do know the difference between an emoji and an emoticon, right?

Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits

The Security Ledger

But what if the first successful attack on the grid didn’t happen in March 2019, but 15 years ago, in 2004? In this episode of the podcast #162: according to the non profit that oversees it, the first disruptive hack of the U.S. grid happened in March of this year.

Agile intranet strategies


I co-wrote this piece for Image & Data Magazine in 2004 (PDF), but its still relevant to the question posted by Andrew Wright on LinkedIn : How should great intranets be developed? Our recommendation back in 2004 was that we should stop searching for intranet perfection, instead work in a way that is more 'agile': Flexibility and the ability to prioritise are key to success.

IT 55

What is information literacy?


A lot has changed since 2004 when the first CILIP definition of information literacy was devised. What is information literacy?

Documentation Theory for Information Governance

ARMA International

1 (2004): 108-132. 1 (2004): 108-132; Richard Harper, Inside the IMF: An Ethnography of Documents, Technology, and Organizational Action (Cambridge, 1997); David M.

Last Watchdog’s IoT and ‘zero trust’ coverage win MVP awards from Information Management Today

The Last Watchdog

I’ve been paying close attention to privacy and cybersecurity since 2004, first as a technology reporter at USA TODAY, then as Editor-In-Chief of ThirdCertainty.com, a corporate-underwritten news analysis blog. I’m privileged to share news that two Last Watchdog articles were recognized in the 2019 Information Management Today MVP Awards.

Mary’s Annual Internet Trends

John Battelle's Searchblog

I went on to launch the Web 2 Summit in 2004, and it was at that event that Mary started presenting her annual Internet Trends deck. The post Mary’s Annual Internet Trends appeared first on John Battelle's Search Blog.

IT 90

A straightforward and pragmatic guide to leadership, management and teamwork


A straightforward and pragmatic guide to leadership, management and teamwork. Facet Publishing announces the publication of The No-nonsense Guide to Leadership, Management and Teamwork by Barbara Allan.

On Math, iPhones, Android, and the 100K Phone Gap

John Battelle's Searchblog

It reminds me of Google in 2004, when the media fell in love with the concept of search. The media really, really, really loves to write about Apple and the iPhone these days.

Sales 114

Down under


Fine of $530 million proposed for bank who failed to catch transfers of money in and out of an account owned by someone who left the country (Australia) in 1999 (and who “had also been charged in Lebanon in 2004 with belonging to a terrorist organization…”). Banks normally monitor ( i.e. , manage) money transfers ( i.e. , information), in part to make sure that nefarious people are not transferring money to other nefarious people.

PCI DSS: Lessons to learn from recent payment card breaches

IT Governance

Unveiled in 2004, the PCI DSS is the result of a collaboration between major credit card brands (American Express, Discover, JCB, Mastercard and Visa) and aims to facilitate the broad adoption of consistent data security measures involved in payment card processing.