New Worm exploits IE flaw discovered only last week
Security experts are warning of a new virus that has been released just days after the vulnerability it exploits was made public.
MyDoom-AH targets a vulnerability in Internet Explorer which only surfaced last week. As yet, Microsoft has not released a patch to secure the browser. ...more
Inventec to make $500 notebooks in 2003
Inventec will make budget notebooks that retail in the US for $500 around the latter half of 2003
Notebook maker Inventec is preparing to contract-manufacture low-cost notebooks for vendors to retail at US$500 in the second half of next year.
Company president Tom Cho said that without using high-end processors, which target only power users, it is possible to make a US$500 notebook. Cho noted that the model would not be a DeskNote, which uses desktop components in a notebook-like computer, but rather a fully-functional notebook with a battery and keyboard. ...more
UK games chart: Hitman shoots its way to top of charts
Hitman: Blood Money (for PC, PS2, X360, Xb) has shot to number one in this week's ELSPA games chart. A new entry from Eidos, the action-shooter game once again features the hired-gun Agent 47, travelling through New Orleans, Los Angeles and Mississippi, and the dirty work of the ICA, which is definitely not the Institute of Contemporary Arts.
The long-running previous number one, EA Sports' FIFA World Cup Germany 2006 (PC, PS2, Xbox and Xb360), drops down to two. ...more
Madonna fights to own her .com
Madonna is claiming rights over Madonna.com.
The pop star has complained to the World Intellectual Property Organisation (WIPO) accusing Don Parisi of cybersquatting and, "holding the domain name hostage. ...more
Borland releases JBuilder 9
Borland has updated its flagship Java programming system, JBuilder 9. The emphasis is on making JBuilder a heavyweight player in critical, team-based development environments.
Specifically, Borland highlights the integration of JBuilder with a range of application lifecycle management tools, such as for requirements management, modelling, profiling and deployment. ...more