Stories by Matthew Broersma

  • Android invades hardware

    Google's Android developer kit for mobile phones has been successfully installed on several hardware devices, a step toward turning it into a genuine mobile-phone platform.

  • Open source security bugs uncovered

    A US Department of Homeland Security (DHS) bug-fixing scheme has uncovered an average of one security glitch per 1,000 lines of code in 180 widely used open source software projects.

  • Red Hat 4 gets a facelift

    Red Hat has followed up its release of release of Red Hat Enterprise Linux (RHEL) 5.1 two weeks ago with an update to its older RHEL 4 line of operating systems, including kernel updates and hardware tweaks.

  • Software costs set to fall, says Gartner

    Companies should expect to be able to reduce their software costs significantly over the next 10 years, as new factors loosen the traditional hold of software makers over their customers, according to Gartner.

  • Windows for Supercomputers needs less memory than Vista

    With its first public beta of Microsoft Windows HPC Server 2008, released last week, Microsoft coincidentally highlighted one of the reasons why Windows Vista adoption figures have remained near-non-existent in the enterprise -- its expensive hardware requirements.

  • Researchers eye open-proxy attacks

    Advertising and click-through fraud is currently topping the list of malicious activity funnelled through open proxy servers, followed by junk email, according to a research project deploying fake open proxies to catch crooks.

  • Old worm Slammer threatens again

    An old worm known as Slammer, which originated back in January 2003, is still going strong according to Gunter Ollmann, director of security strategy at IBM's Internet Security Systems (IBM ISS).

  • Study finds Internet rife with attack codes

    Even seemingly safe web addresses are rife with attack code aiming at vulnerable clients, according to a new study from the Honeynet Project. The study also found that methods such as blacklists can be surprisingly successful in stopping client-side attacks.