2,180 News Story Topics
Remove Filter ![]() | |
To put it mildly, it's been a bad week for cloud computing. First of all word got out that Microsoft, the keepers of the data for users of Sidekick phones [URL="http://www.tomshardware.com/news/Microsoft-T-Mobile-Sidekick-Data-Lost,8832.html"]completely hosed the data.[/URL] I mean kaput, gone, vanished. See you later, bye. If you don't have a back up, … | |
Want to buy a Dell machine loaded with Linux? Shame, as it appears that Dell Europe would really rather you bought a Windows-powered one, despite having a website devoted entirely to selling Dell Ubuntu laptops. And, oh boy, does it use some strange arguments to dissuade you from becoming a … | |
When it comes to enterprise computer technology, everything seems to be happening in the cloud these days. Offsite storage was one of the first iterations of cloud computing and is continuing to gain traction as a smart way for companies to safely retain data. You're probably familiar with the typical … | |
In the alternative energy movement, the mantra is a simple one: go to where you want to be – not where you are now. Think of hockey great Wayne Gretzky, who once said “I skate to where the puck is going to be, not where it is has been, or … | |
Hands up if you remember Opera Software, you know the Norway-based developer of alternative web browser clients. In the days before Firefox, Opera was the client most likely to shake up Microsoft and for a while seemed to be doing pretty well in that regard. Then Firefox came along and … | |
So you've lost access to your data through hardware failure or accidental erasure. What do you do? Like most cyber-warriors you naturally turn to the Internet, be that via a Google search or YouTube video, for help. That's a big mistake says [Kroll Ontrack](https://www.krollontrack.co.uk/blog/), a data recovery specialist, as self-inflicted … Hardware and Software encryption smartphone troubleshoot-hardware | |
[ATTACH=RIGHT]16325[/ATTACH]Today, the [I]Entertainment Software Association[/I] released findings from two studies by Dr. Christopher Ferguson of Texas A&M University. In an interesting twist, Dr. Ferguson's findings suggest that not only are violent video games okay to give to children, they may actually be beneficial. Video games are often blamed for violent … Hardware and Software gaming home-theater social-media | |
According to research from data recovery specialists Kroll Ontrack, some three quarters of those workers that had lost data on a broken device didn't attempt to ensure that information was irretrievable before disposing of the hardware.  It doesn't matter whether the hardware itself is a PC or laptop, … | |
Guardian newspaper columnist [Dawn Foster](https://twitter.com/DawnHFoster) posted images on Twitter this weekend showing how she was able to login to the official Conservative party conference app as Boris Johnson, until recently the UK Foreign Secretary. Not only was there no password required to login to the app, all that was required … | |
I've been writing about various security risks in the health sector for many years now. Usually my articles cover patient privacy, data protection and health provider network insecurity issues. Occasionally, they spill over into darker territory where the cyber risk morphs into a very real one as far as the … | |
It has long since been argued that continued exposure to something over a length of time will reduce the shock value of whatever it happens to be, from violence in movies to swearing in public. Now according to a [URL="http://www.usatoday.com/news/health/2007-12-12-porn-study_N.htm"]report[/URL] researchers at the Brigham Young University have suggested that the … Hardware and Software | |
Following the recent ransomware attacks that leveraged the WannaCrypt0r malware and NSA-developed EternalBlue vulnerability exploit, there was [plenty of advice](https://happygeek.com/?p=812) that backup, backup, backup was the best mitigation. Data backups are, of course, an important part of any business continuity strategy. However, what happens when your backups are also encrypted … | |
It's hard for me to admit it but there are things, ten things to be exact, that I really hate about Linux. Sometimes I think it's just me but I do see other people stating a few of these in the forums so I'm at least not alone with some … | |
The UK's National Crime Agency (NCA) has said that it has dealt a "major blow to dark web markets." In a [statement](http://www.nationalcrimeagency.gov.uk/news/news-listings/483-international-law-enforcement-deals-major-blow-to-dark-web-markets) issued on the 7th November the NCA says that a coordinated operation between law enforcement agencies in Europe and the US has "targeted market places for illegal commodities … | |
Although it took eBay itself an absolute age to disclose that a serious breach had taken place, and then [completely screwed up the process of ensuring users change their passwords](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/479152/more-ebay-security-stupidity-exposed), this should come as no real surprise. Happygeeks' Law states: the larger the corporate, the longer it takes to admit … | |
The news that JPMorgan Chase & Co, which is the largest of the US banks with a reach that extends to half of all American households, has been breached will surprise nobody. At least not in the sense that this is old news, with a disclosure of the event happening … | |
My van was built 15 years ago by Mazda in Japan as a multi-purpose 'people carrier' vehicle with the unlikely name of a Bongo. It has survived the years well, and I have now converted it into a camper van. Another 15 year old that travelled across the globe has … | |
Hitachi has now announced a 1-terabyte internal hard drive, claiming they're the first to unveil a 1 terabyte hard drive in the industry. It doesn't sound terribly impressive, given the fact that storage mediums are increasing faster than you can blink an eye. However, they have done quite a feat … | |
Adobe Flash users have been under attack from cybercriminals again, this time courtesy of [a zero day exploit kit by the name of Angler](http://malware.dontneedcoffee.com/2015/01/unpatched-vulnerability-0day-in-flash.html). The exploit kit has been readily available on the dark market, and hits vulnerabilities to be found in Flash Players up to 15.0.0.223, as well as … | |
News has broken this weekend that the personal data, including bank account details, of some 2.4 million customers of the Carphone Warehouse may have been compromised following a breach that the mobile phone retail giant is calling "a sophisticated cyber-attack." The company also warns that encrypted credit card data of … | |
Sanjib Mitra is a man who likes to be responsible and do the right thing. A year ago he discovered, quite by accident, that a little bit of URL tweaking could reveal personal data about people other than himself within a website database. He was completing a complicated application form … | |
Action video camera vendor GoPro has announced that it is riding into the Tour de France with a promotional [video](https://www.youtube.com/watch?v=X63m5r5jJlg) to celebrate being named the official camera of the world's largest annual sporting event with a worldwide television audience of some 4 billion people, but not before the BBC [reported](http://www.bbc.co.uk/news/technology-32934083) … | |
A couple of decades ago, in another life, I wrote a little script which would capture keystrokes and then store that data within the 'white space' of an image file. It was pretty crude, but it was also twenty years ago and to be honest nobody was really looking for … | |
[URL="http://www.pcadvisor.co.uk/poll/index.cfm?action=showresults&pid=3228421"]A new poll into Operating System popularity by a British computer magazine[/URL] has revealed that an incredible 37 percent of respondents are still using Windows XP. That's more than Windows 7 which managed to woo 30 percent of the folk taking part, and Vista could only garner a pretty poor … | |
Werner Vogel, Amazon Web Services (AWS) CTO, speaking at the AWS Summit in London yesterday has made the rather amazing claim that security in the cloud is "much stronger" than anything you can have on-premises. As someone who has been writing about information security for more than 20 years, and … | |
As any fan of the The Matrix trilogy of films will tell you, the Keymaker is a character in The Matrix Reloaded who has the keys to provide Neo access to the system mainframe and by so doing hopefully save Zion from the ongoing sentinel attack. In the movie, the … | |
According to a [SecureList posting](https://securelist.com/blog/69462/darwin-nuke/) dated April 10th, researchers Anton Ivanov, Andrey Khudyakov, Maxim Zhuravlev and Andrey Rubin discovered a vulnerability in the Darwin kernel back in December 2014. Why is this of interest? Well, the Darwin kernel is an open source part of both the Apple operating systems. The … | |
Which 12 year old operating system which is still running on 11 million servers is about to die? Yep, that's the one: Microsoft Windows Server 2003 reaches 'end of life' status on July 14th. One of the longest running discussions on DaniWeb asks the question [Why does Windows XP refuse … | |
Security is, more often than not, a case of getting the basics right. This is certainly true of the cloud where the hyperbole surrounding insecurity far outweighs the actual risk in my opinion. Not that the cloud is an inherently secure place to store data, just that it poses similar … Hardware and Software cybersecurity encryption storage | |
According to new research from Venafi, apparently some 74 percent of 'Forbes Global 2000 organizations' (or the big boys of business if you prefer) have yet to properly secure their public facing servers against the Heartbleed OpenSSL threat. That's a year after the thing broke for goodness sake! Venafi found … | |
The Google Glass wearable computing 'enhanced reality' project got off the ground this week at the Google I/O Developers Conference in San Francisco earlier this week. Around 6,000 developers were present to see a demonstration of the futuristic technology which integrates a small video-display suspended from the arm of the … | |
It's that time of year again, and the latest [Secunia Vulnerability Review](http://secunia.com/vr2015/) has been published. This analysed anonymous data gathered from scans right across 2014 of millions of computers which have Secunia Personal Software Inspector (PSI) installed and revealed some interesting statistics. On average, the computers used by the people … | |
Halifax is the town in West Yorkshire where I live, and it also happens to be the name of a well known UK Bank which started life there. Best known on the this side of the pond for TV adverts featuring a friendly chap called Howard Brown, a former customer … | |
In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York … Hardware and Software cybersecurity data-protection encryption engineering legal | |
Windows is, according to just about any security expert you ask, the operating system most vulnerable to attack. Unless the security expert happens to be from Microsoft, that is. So it was quite refreshing to see Microsoft admitting to a spike in attacks on Windows this week. [attach]15849[/attach]According to [URL="http://blogs.technet.com/b/mmpc/archive/2010/07/13/update-on-the-windows-help-and-support-center-vulnerability-cve-2010-1885.aspx"]a … | |
Chinese computer manufacturer [Lenovo has admitted](http://support.lenovo.com/us/en/product_security/superfish) that it installed an adware component called Superfish on 16 million PCs shipped between September 2014 and February 2015 in order to "help customers potentially discover interesting products while shopping" according to an official statement made by the company. Although there is some argument … | |
According to [François Beaufort](https://plus.google.com/+FrancoisBeaufort/posts) who is a French 'Happiness Evangelist' at Google (and no, I didn't make that up), Chromebook users will soon be able to choose what operating system they want. In a publicly shared post from last week, Beaufort states that "in order to support installing and testing … | |
Is Apple really 'closing the gap' on Android as far as smartphone market share is concerned, or is there more to the battle of the mobile handsets than the latest set of headline figures suggest? [ATTACH=RIGHT]23604[/ATTACH]Certainly if you take the research, and associated press releases surrounding it, from Nielsen regarding … | |
So Google has [admitted defeat](https://plus.google.com/+GoogleGlass/posts/9uiwXY42tvc) and is pulling the Google Glass Explorer Program with pretty much immediate effect. January 19 will be the last day to get the Glass Explorer Edition. In a statement, a Google Glass spokesperson said that "we’re ready to put on our big kid shoes and … Hardware and Software apple google seo smartphone | |
I used to refer to [URL="http://www.microsoft.com"]Windows[/URL] as "The Infinitely Rebooting OS" and it has improved some over earlier versions but today was a different story and reminded me of those thrilling days of yesteryear. My question is why, Windows, why? Why must I reboot when I install a desktop application? … | |
Oh the irony. In what is starting to read very much like the script to a Hollywood movie itself, the latest twist to the Sony Pictures hacking plot took an unexpected turn yesterday. It would appear that at one stage yesterday access to the web across pretty much all of … | |
An increasing number of my acquaintances seem to be in the habit of buying cheap Android smartphones when in China on business and, increasingly, from online auction sites. More often than not these will be clones of flagship models but without the flagship price tag; however, cheap is not always … | |
I'm a fairly prominent member of the Linux Community as a writer, contributor, and longtime evangelist for the cause and there are a few things I'd like the Community-at-Large to consider on my behalf. These are five things that I wish Linux had. Consider this as my wish list for … | |
Yesterday, September 10, 2009, the announcement came that [URL="http://www.microsoft.com"]Microsoft[/URL] launched and is funding a new open source organization named [URL="http://www.codeplex.org"]CodePlex Foundation[/URL]. The [URL="http://www.codeplex.org/board-of-directors.aspx"]major players[/URL] in the new organization are from Microsoft, [URL="http://www.novell.com"]Novell[/URL] and [URL="http://www.dotnetnuke.com"]DotNetNuke[/URL]. Does this mean that a brave new Microsoft is beating its proprietary, closed-source swords into open … | |
Ever wondered why the bad guys continue throwing malware in your direction? The obvious answer is the correct one: because they make money from doing it. On Thanksgiving Day, as all others across the year it would seem, they can be thankful for the high profit to be raked in … | |
You may be wondering what a superfecta actually is, and the answer is: the most dangerous and serious threat to business. To clarify, the superfecta as defined by secure cloud hosting outfit FireHost is a group of four attack vectors that comprises of Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), … | |
According to research commissioned by security vendor [Bit9 + Carbon Black](https://www.bit9.com/solutions/carbon-black/), nearly half (49%) of the organisations questioned admitted they simply didn't know if their businesses had been compromised or not. This uncertainty regarding cyber-attack detection ability comes in stark contrast to the 32% who confirmed they had been attacked … | |
So, today is '[World Paper Free Day](http://www.aiim.org/events/paper-free-day)' apparently and I'm not sure whether it's appropriate to buy a card in the circumstances. Joking aside, what I am sure of is that such Hallmark days do provide an opportunity for press releases to be thrown in my general direction. And so … | |
A 22 year old vulnerability, yes you read that right, has been discovered which some security experts suggest could be bigger than Heartbleed. The bug, reported as '[CVE-2014-6271:remote code execution through bash](http://seclists.org/oss-sec/2014/q3/649)' relates to how environment variables are processed: with trailing code in function definitions being executed independently of the … | |
Although based in New York, DaniWeb is very much a global community. I'm from England, for example, and our moderator Diafol (who will be well known to anyone who has ever browsed the [PHP forum]( https://www.daniweb.com/web-development/php/17)) is a Welshman through and through. I mention this as last week I went … Hardware and Software android android-development audio cybersecurity ios iphone web-browser wordpress |
The End.