2,180 News Story Topics

Remove Filter
Member Avatar for
Member Avatar for happygeek

So it seems that an Internet Explorer zero day vulnerability allowed the back door to be opened that resulted in the [URL="http://www.daniweb.com/news/story252590.html"]hack attack on Google[/URL] and many others that has received such publicity this week. According to [URL="http://siblog.mcafee.com/cto/operation-%E2%80%9Caurora%E2%80%9D-hit-google-others/"]McAfee[/URL] it has identified an Internet Explorer vulnerability as being one of the …

Member Avatar for Tcll
1
1K
Member Avatar for happygeek

So, Microsoft and iSIGHT uncovered another 0-day vulnerability; this time impacting all supported versions of Microsoft Windows and Windows Server 2008 and 2012. iSIGHT [has detailed](http://www.isightpartners.com/2014/10/cve-2014-4114/) in the wild exploits of the vulnerability, and points the finger of suspicion at state-sponsored Russian interests. The Dallas-based cybersecurity outfit explained that the …

Member Avatar for oriclon
3
547
Member Avatar for happygeek

At the start of the year, [DaniWeb reported](https://www.daniweb.com/internet-marketing/social-media-and-communities/news/470719/snapchat-plays-blame-game-after-hack) how Snapchat, the self-destruct photo messaging service, had been hacked and information regarding 4.5 million users had been stolen. Fast forward to now, and Snapchat is again in the mire: nude images have started to appear on 4chan which have been stolen …

Member Avatar for gtcorwin
1
544
Member Avatar for happygeek

Microsoft will stop releasing security updates, hotfixes and other updates for Windows XP SP2 on July 13th 2010. No biggie, you might think, after all Windows XP SP3 was released way back in April 2008 and since then we've had both Vista (perhaps best forgotten) and the much more palatable …

Member Avatar for Tcll
1
967
Member Avatar for happygeek

More often than not I'll be writing about the security problems facing Windows XP users, such as when I recently reported how a large number of enterprises are still running XP SP2 machines which will shortly [URL="http://www.daniweb.com/news/story287954.html"]stop being supported by Microsoft[/URL] in terms of security updates, hotfixes and the like. …

Member Avatar for Tcll
1
972
Member Avatar for slfisher

One of the biggest security stories so far this year is that of the high school that remotely triggered webcams in laptops given to students -- which the school said it only did to help track stolen laptops, and which some students and families said was a violation of their …

Member Avatar for happygeek
1
648
Member Avatar for happygeek

The Internet of Things (IoT) is something of a buzz-phrase right now, and locking down the IoT is certainly something that vendors across both security and hardware industries are talking up. The problem with the publicity surrounding stories of 'things' that have been hacked is that, well, they never really …

Member Avatar for happygeek
2
496
Member Avatar for happygeek

Reports started circulating yesterday that Gmail had been hacked, with some 5 million logins at risk. This follows the publication, on Tuesday, of a plain text list of Gmail usernames and passwords on a Russian Bitcoin forum. Within 24 hours the 'hack hysteria' had taken hold and people were being …

Member Avatar for Slavi
2
573
Member Avatar for happygeek

Some interesting [research](http://www.proofpoint.com/threatinsight/posts/phishing-in-europe.php) from security outfit Proofpoint was published this morning which reveals that unsolicited email heading towards users in the UK is three times more likely to contain malicious URLs than that destined for users in the United States, or Germany, or France for that matter. It's not, as …

1
291
Member Avatar for happygeek

So, a bunch of US financial institutes have been hacked. Nothing new there, if we are being brutally honest. The newsworthyness in this particular case comes courtesy of one of those organisations apparently being none other than JP Morgan Chase. USA Today reported yesterday that a federal law enforcement official …

1
527
Member Avatar for happygeek

Every week, Stephen Coty [writes about](https://www.alertlogic.com/resources/blog/) interesting exploits that have caught his attention as chief security evangelist at Alert Logic. This last week (in a currently password protected posting) [he mused about](https://www.alertlogic.com/blog/exploit-monday-a-few-interesting-ones-to-be-aware-of-7/) a 'JournalCtl and Syslog Terminal Escape Injection' zero day which could be of interest to the Linux gurus …

Member Avatar for rubberman
3
1K
Member Avatar for happygeek

SuperValu has confirmed that is has, indeed, suffered a data breach. The supermarket company [stated](http://www.supervalu.com/security.html) that what it calls a "criminal intrusion into the portion of its computer network that processes payment card transactions for some of its retail food stores, including some of its associated stand-alone liquor stores" may …

1
326
Member Avatar for happygeek

Hardly a week goes by without yet another press release hitting the desk of your technology journalist, or research flag being raised amongst the IT Security profession, that claims Android is insecure. What Android actually is, just like Windows on the desktop in fact, is a big and attractive target; …

Member Avatar for Kelly Burby
1
386
Member Avatar for happygeek

As a platform, Android is naturally very attractive to the criminal fraternity in terms of potential profitability. After all, it has the market share and that nearly always means it has large numbers of users for whom the word security may as well be written in the Cyrillic alphabet. My …

Member Avatar for expertmagician
4
403
Member Avatar for happygeek

Yesterday, Tor [issued a security advisory](https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack) which revealed that a group of relays had been discovered on July 4th which looked like they "were trying to deanonymize users." The advisory states that the attack "involved modifying Tor protocol headers to do traffic confirmation attacks" with the relays having joined the …

Member Avatar for Slavi
2
671
Member Avatar for happygeek

It seems like forever, but actually it was only the end of last year that we were [writing about CryptoLocker](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) which had pretty much redefined the ransomware landscape. Now this particular threat market is morphing again with the discovery of onion crypto ransomware. Also known as Critroni, and CTB-Locker for …

Member Avatar for iamthwee
1
404
Member Avatar for happygeek

According to newly published research from cloud-based social Wi-Fi software outfit [Purple WiFi](http://www.purplewifi.net/), of 2,540 consumer questioned vastly more were concerned about getting access to pornography than were worried about matters of data security. The 'Using Wi-Fi in Public Places’ study revealed that 28 percent of those asked (711 people) …

Member Avatar for Hiroshe
2
504
Member Avatar for happygeek

The average car is increasingly becoming a vehicle for the Internet; but does this also make it a vehicle for cybercrime? Security vendor Kaspersky Lab, in cahoots with Spanish digital media outfit IAB, reckons that software updates, in-car mobile apps and privacy are all areas which have ripe potential for …

2
310
Member Avatar for happygeek

Amazon has, this week, revealed the first smartphone designed by the online retail giant in the shape of the Amazon Fire. Described by the company as featuring "two new breakthrough technologies that allow you to see and interact with the world through a whole new lens" and by some others …

Member Avatar for expertmagician
3
592
Member Avatar for happygeek

The Onion Router, better known as the Tor Network, is often thought of as being the dark-side of the web. Not least as the anonymity provided by Tor meant that sites hosted on so-called hidden service servers were free to trade in just about anything from drugs and guns through …

Member Avatar for happygeek
2
1K
Member Avatar for happygeek

Back in the eighties, the Defense Advanced Research Projects Agency ([DARPA](http://www.darpa.mil/)) spent more than a billion dollars in an attempt to create what was, in effect, Skynet. You know, the self-aware artificial intelligence system that goes bad in The Terminator movie. DARPA called it the Strategic Computing Initiative, but it …

Member Avatar for Hiroshe
2
428
Member Avatar for happygeek

Following on from the news that an eBay password database has been compromised, and universal advice from security experts that users should now change their passwords, one thing has been loud clear: the total lack of that password change requirement from eBay. Sign into eBay and there is nothing to …

Member Avatar for happygeek
1
1K
Member Avatar for jsherm101

Microsoft is just about over the three day hump that has been their timid Windows 8 release, and amid the [cries of anger](http://www.daniweb.com/hardware-and-software/microsoft-windows/windows-vista-and-windows-7-8/news/438107/windows-8-launch-three-year-user-backlash-predicted) over die-hard user, it's apparent Microsoft's move toward Windows 8 was one for the long term, not the short time. ![Win8-logo1](/attachments/small/3/Win8-logo1.jpg "align-left") While some jump to call …

Member Avatar for Tcll
0
539
Member Avatar for Techwriter10

I was debating with my friend [URL="http://twitter.com/DavidAKnopf"]David A. Knopf[/URL] on Twitter recently about the iPad's target market. He was sure that iPhone and Mac owners like himself were the key targets, while I argued that it was precisely the opposite, people who didn't own these devices already. We went back …

Member Avatar for creamtown
0
5K
Member Avatar for happygeek

Given the amount of negative press that has been generated since the announcement of the iPhone 5, calling it everything from boring to disappointing and even naming it the Apple Meh!phone, you might be forgiven for thinking nobody would want to buy it. You would be wrong. Very wrong indeed, …

Member Avatar for creamtown
2
752
Member Avatar for happygeek

Responding to the publication of a report which shows Amazon, Apple and Microsoft all scoring badly when it comes to a reliance upon 'dirty energy' to power their data centers, Apple has hit back with claims that the report over-estimates the power consumption of iCloud and projects being constructed to …

Member Avatar for Ginetta23
0
623
Member Avatar for happygeek

Android-driven devices, including smartphones and tablets manufactured by the likes of Asus, LG, Motorola and Samsung, are being sold with pre-installed malware according to claims made by the CTO and Founder of Marble Security. David Jevans made the claim following complaints from a potential client that a mobile security platform …

Member Avatar for creamtown
0
840
Member Avatar for happygeek

So here I am working on a Sunday morning, as usual, and I when I fire up my laptop (which serves as my desktop) a message appears informing that an update is being applied and it won't take long. Imagine my surprise when it turns out that this update appeared …

Member Avatar for happygeek
0
724
Member Avatar for happygeek

Today is another of those 'Hallmark' IT security days; in the case of Tuesday the 11th of February 2014 that means 'Safer Internet Day'. I'm not going to start yet another rant about the pointlessness of this, and why every day should be Safer Internet Day. If you want to …

Member Avatar for Shrike72
0
494
Member Avatar for happygeek

News headlines screaming that yet another Microsoft Windows vulnerability has been discovered, is in the wild or has just been patched are two a penny. Such has it ever been. News headlines declaring that a 'major security problem' has been found with Linux are a different kettle of fish. So …

Member Avatar for happygeek
2
600
Member Avatar for happygeek

So, Microsoft has finally announced that the SkyDrive cloud storage product line is to be renamed OneDrive. This isn't as a result of disappointing user take up leading to a re-branding exercise, it's much more daft than that. Six months ago a judge in a UK court ruled that Microsoft …

Member Avatar for Ancient Dragon
2
798
Member Avatar for jsherm101

Aside from being one of the [most hated CEOs](http://www.businessinsider.com/hated-tech-ceos-2011-12?op=1) in the world of technology, Steve Ballmer is hard at work trying to design a new world for Microsoft and the future of consumer electronics and, simultaneously, saving himself from a history of redicule. Ballmer's ambitious claim of [400 million](http://venturebeat.com/2012/09/05/ballmer-400m-windows-phone-8-windows-8-devices/) Windows …

Member Avatar for MidiMagic
0
400
Member Avatar for khess

System Administrators (SAs) have a tough job: Dealing with users and user accounts, security, patching, updates, upgrades, disk space, performance and other miscellaneous tasks often known as "other duties as assigned." For some SAs, the day never ends. Despite the challenges, pitfalls and occasional irate user; system administration is a …

Member Avatar for Spencer_1
0
2K
Member Avatar for khess

This week I'll be at InterOp Las Vegas looking for the latest and coolest Linux-based technologies that InterOp exhibitors have to offer. My favorites are certainly the "new innovators." New innovators are small companies who've developed their own products and are trying to get noticed in the high-tech space. These …

Member Avatar for Grant_3
0
405
Member Avatar for jsherm101

![inline-2-windows-8-logo-pgram](/attachments/small/3/inline-2-windows-8-logo-pgram.jpg "align-left") It's been a month since Windows 8, and if you've been using the new OS you're likely going through a period of confusion over the new Modern UI interface, as well as wondering if there's anything you're missing out on. The Windows 8 experiene is significantly different from …

Member Avatar for Laura530
0
535
Member Avatar for khess

The world's largest technical support, software and hardware companies use Linux on a daily basis for a variety of tasks and solutions. This post gives you an overview of all the ways in which large companies use Linux. Most don't use Linux on the desktop but do use it in …

Member Avatar for rubberman
0
4K
Member Avatar for happygeek

Nintendo is sitting firmly at the top of the games console tree right now, having just been 'bigged up' by the release of the US sales figures for October which show the Wii on 803,000 and the DS on 491,000. Both well ahead of nearest rival, the Xbox 360 on …

Hardware and Software gaming home-theater microsoft
Member Avatar for johndaniweb
0
1K
Member Avatar for happygeek

Apparently it's Data Privacy Day tomorrow (January 28th) which, if you will allow me to quote the [Stay Safe Online](https://www.staysafeonline.org/data-privacy-day/about) website blurb, is an "international effort to empower and educate people to protect their privacy and control their digital footprint". Given the Edward Snowden NSA spying revelations that broke during …

Member Avatar for gerbil
3
672
Member Avatar for happygeek

The Distributed Denial of Service (DDoS) attack is becoming the crowbar of the online criminal. In the past we have got rather used to DDoS attacks being one of the favoured approaches of hacktivists, with perhaps the Low Orbit Ion Cannon (LOIC) and later the High Orbit Ion Cannon (HOIC) …

Member Avatar for robert02
1
902
Member Avatar for happygeek

According to Dell SecureWorks Counter Threat Unit (CTU) security researcher [Keith Jarvis](http://www.secureworks.com/cyber-threat-intelligence/threats/cryptolocker-ransomware/), the CryptoLocker ransomware that has been written about so much of late has infected as many as 250,000 computers during the first 100 days of distribution (staring on the 5th of September, 2013). What's more, Jarvis estimates, based …

2
520
Member Avatar for happygeek

US retail giant Target [has confirmed](http://pressroom.target.com/news/target-confirms-unauthorized-access-to-payment-card-data-in-u-s-stores) that hackers gained access to payment card data that could mean 40 million credit and debit card accounts are at risk. An official statement says that the retailer is "aware of unauthorized access to payment card data that may have impacted certain guests making …

Member Avatar for <M/>
3
404
Member Avatar for happygeek

A [Channel 4 News investigation](http://www.channel4.com/news/phone-mobile-data-24-hours-apps-security-secret) in the UK has revealed that in a 24 hour period just one smartphone made 350,000 requests to 315 different servers and made 30,000 requests to 76 servers when otherwise sitting totally idle for 45 minutes. Oh, and then there was the location data being …

Member Avatar for mikoyan
3
580
Member Avatar for happygeek

According to a [report](http://www.fireeye.com/resources/pdfs/fireeye-operation-ke3chang.pdf) from researchers at US security outfit FireEye, a number of computers belonging to diplomats attending the G20 summit in Russia three months ago, including at least five European foreign ministries, were successfully targeted by Chinese hackers. FireEye researchers had monitored a server, one of 23, used …

1
488
Member Avatar for happygeek

If my iPhone 5s fingerprint data is walled off from the rest of A7 chip and the rest of iOS 7 in a 'Secure Enclave' and is never accessed by iOS or other apps, as Apple claims, then how come it all vanished when my iPhone crashed and I had …

Member Avatar for Kelly Burby
0
425
Member Avatar for happygeek

Microsoft knows it has to do something in order to claw back some kind of market position, not now but five years into the future. The culture of computing is changing amongst the young and hip consumer, and it's moving away from the Microsoft Windows-centric vision of the past. While …

Member Avatar for mido2013
8
2K
Member Avatar for happygeek

According to [BitcoinWatch](http://bitcoinwatch.com/) the current market capitalization of the virtual currency stands at an incredible $10.4 billion. A single Bitcoin is now worth more than $800. In the ongoing aftermath of [the Silk Road takedown](http://www.daniweb.com/hardware-and-software/networking/news/466982/silk-road-2-goes-live-did-the-fbi-arrest-the-wrong-dread-pirate-roberts) many people wrongly assume Bitcoin is some kind of criminal currency, used to trade in …

0
673
Member Avatar for happygeek

Kryten is a Series 4000 mechanoid, the neurotic robotic servant appearing in cult British sitcom Red Dwarf. So what's he got to do with your computer, apart from the somewhat stereotypical link between geeks and science fiction? Well, the Kryten character was played (in all but the first appearance) by …

Member Avatar for jackalex545
3
463
Member Avatar for happygeek

Which? magazine [has revealed](http://blogs.which.co.uk/technology/phones-3/apple-iphone-5s-fastest-phone-samsung-galaxy-s4-lg-g2/) the new Apple iPhone 5s to be the fastest smartphone of all in the latest round of processor benchmarking tests, despite it having less cores that rival handsets. Not only was the 5s almost twice as fast as the iPhone 5 in testing, but also around …

Member Avatar for Kelly Burby
0
559
Member Avatar for Glass_Joe

Thanks to a federal copyright law ruling on Monday by the Library of Congress, jailbreaking your iPhone doesn’t have to be kept to the underground forums like it's alcohol during a digital prohibition. The process is now completely legal under US law. Grab a glass of e-freedom![ATTACH]16137[/ATTACH]The resulting decision was …

Member Avatar for CaptBah
1
1K
Member Avatar for Dani

At first I thought it was just me. I restarted my DNS server after noticing intermittent connection issues. But nope! It looks like Facebook, Twitter and a handful of other sites are currently down in parts of the United States. At least here with Time Warner in NYC, and according …

Member Avatar for Warrens80
1
311

The End.