1,440 Topics
More often than not I'll be writing about the security problems facing Windows XP users, such as when I recently reported how a large number of enterprises are still running XP SP2 machines which will shortly [URL="http://www.daniweb.com/news/story287954.html"]stop being supported by Microsoft[/URL] in terms of security updates, hotfixes and the like. … | |
There is no doubt that SEO is an important part of the online marketing machine. Lest we forget, SEO stands for Search Engine Optimization and only a fool would imagine that they could do business online without being indexed by the Gods of Search (Google, Bing, Yahoo!) However, there is … | |
As well as being CEO of penetration testing specialists High-Tech Bridge, Ilia Kolochenko is also perhaps unsurprisingly a white hat hacker of some repute. Equally unsurprising is the fact that he has [warned](https://www.htbridge.com/blog/plugins_and_extensions_the_achilles_heel_of_popular_cmss.html) that security vulnerabilities in leading CMS platforms such as Drupal, Joomla and WordPress are effectively leaving the … ![]() | |
The Internet of Things (IoT) is something of a buzz-phrase right now, and locking down the IoT is certainly something that vendors across both security and hardware industries are talking up. The problem with the publicity surrounding stories of 'things' that have been hacked is that, well, they never really … | |
I have contributed to the 'Real World Computing' section of PC Pro magazine here in the UK for, come the next edition, what will be 20 years. During all of the time contributors to the section, consisting of coders and IT consultants, have been affectionately known as beardies. This despite … | |
Research results just published by digital marketing agency Visibility IQ would appear to confirm what the savvy marketeer already knows: social video is an important driver for engagement and purchase behaviour amongst online consumers.  The research, conducted by Entertainment Media Research Ltd, was based upon interviews with more … | |
There's a truism that I like to share with as many people as possible: if you don't want other people to see something, then don't post it online. It is, you might think, a pretty simple concept to grasp. After all, you wouldn't stroll into a bar with a megaphone … | |
Reports started circulating yesterday that Gmail had been hacked, with some 5 million logins at risk. This follows the publication, on Tuesday, of a plain text list of Gmail usernames and passwords on a Russian Bitcoin forum. Within 24 hours the 'hack hysteria' had taken hold and people were being … | |
Some interesting [research](http://www.proofpoint.com/threatinsight/posts/phishing-in-europe.php) from security outfit Proofpoint was published this morning which reveals that unsolicited email heading towards users in the UK is three times more likely to contain malicious URLs than that destined for users in the United States, or Germany, or France for that matter. It's not, as … | |
Goodwill Industries International, a network of 165 community-based agencies in North America, has been breached. This follows a previous announcement of a potential attack back in July. After an extensive forensic investigation lasting a month, Goodwill has now [confirmed](http://www.goodwill.org/press-releases/goodwill-provides-update-on-data-security-issue/) that "a third-party vendor’s systems" were indeed "attacked by malware, enabling … | |
So, a bunch of US financial institutes have been hacked. Nothing new there, if we are being brutally honest. The newsworthyness in this particular case comes courtesy of one of those organisations apparently being none other than JP Morgan Chase. USA Today reported yesterday that a federal law enforcement official … | |
Every week, Stephen Coty [writes about](https://www.alertlogic.com/resources/blog/) interesting exploits that have caught his attention as chief security evangelist at Alert Logic. This last week (in a currently password protected posting) [he mused about](https://www.alertlogic.com/blog/exploit-monday-a-few-interesting-ones-to-be-aware-of-7/) a 'JournalCtl and Syslog Terminal Escape Injection' zero day which could be of interest to the Linux gurus … | |
A report from Hold Security claims that one of the biggest ever online heists has been committed by a Russian crime gang. It would appear that the data theft includes, wait for it, no less than 1.2 billion (yes billion) username and passwords along with around half a billion email … | |
So you've got a tablet, be that an Android, iPad or Windows powered device. Maybe you've got a phablet or just a bog-standard smartphone. Whatever you have, the chances are that it will have a capacitive touch screen. Most people, however, won't have got a stylus. The reasons are straightforward … | |
SuperValu has confirmed that is has, indeed, suffered a data breach. The supermarket company [stated](http://www.supervalu.com/security.html) that what it calls a "criminal intrusion into the portion of its computer network that processes payment card transactions for some of its retail food stores, including some of its associated stand-alone liquor stores" may … | |
Hardly a week goes by without yet another press release hitting the desk of your technology journalist, or research flag being raised amongst the IT Security profession, that claims Android is insecure. What Android actually is, just like Windows on the desktop in fact, is a big and attractive target; … | |
An interesting [post](http://googleonlinesecurity.blogspot.in/2014/08/https-as-ranking-signal_6.html) appeared yesterday in the official Google Online Security and Webmaster Central blogs which confirms that in an effort to "make the Internet safer" it has been testing a system which looks at "whether sites use secure, encrypted connections as a signal in our search ranking algorithms." This … | |
As a platform, Android is naturally very attractive to the criminal fraternity in terms of potential profitability. After all, it has the market share and that nearly always means it has large numbers of users for whom the word security may as well be written in the Cyrillic alphabet. My … | |
Yesterday, Tor [issued a security advisory](https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack) which revealed that a group of relays had been discovered on July 4th which looked like they "were trying to deanonymize users." The advisory states that the attack "involved modifying Tor protocol headers to do traffic confirmation attacks" with the relays having joined the … | |
It seems like forever, but actually it was only the end of last year that we were [writing about CryptoLocker](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) which had pretty much redefined the ransomware landscape. Now this particular threat market is morphing again with the discovery of onion crypto ransomware. Also known as Critroni, and CTB-Locker for … ![]() | |
According to newly published research from cloud-based social Wi-Fi software outfit [Purple WiFi](http://www.purplewifi.net/), of 2,540 consumer questioned vastly more were concerned about getting access to pornography than were worried about matters of data security. The 'Using Wi-Fi in Public Places’ study revealed that 28 percent of those asked (711 people) … | |
Bugs are, and always have been, a fact of life for the software developer. However, if Microsoft researcher Andrew Begel has his way, they could be a thing of the past. Last month a paper entitled '[Using Psycho-Physiological Measures to Assess Task Difficulty in Software Development](http://research.microsoft.com/apps/pubs/default.aspx?id=209878)' was published which Begel … | |
Yay! But what is 'MM' out of curiosity? 1.11 millimetres? :)  | |
The average car is increasingly becoming a vehicle for the Internet; but does this also make it a vehicle for cybercrime? Security vendor Kaspersky Lab, in cahoots with Spanish digital media outfit IAB, reckons that software updates, in-car mobile apps and privacy are all areas which have ripe potential for … | |
First there was Panda, and then there was Penguin, but is there now Ghost as well? Webmasters will immediately know what I'm talking about as far as Penguin and Panda are concerned: updates to the Google search results ranking algorithm designed to make the search experience more relevant for end … | |
[attach=right]13756[/attach]Portable gizmos that claim to charge your cellphone or iPod on the move are two a penny these days. Solar powered portable charging gizmos are not such a common sight, it has to be said, especially if we are talking about ones that actually work. Which is why I was … | |
Amazon has, this week, revealed the first smartphone designed by the online retail giant in the shape of the Amazon Fire. Described by the company as featuring "two new breakthrough technologies that allow you to see and interact with the world through a whole new lens" and by some others … | |
The Onion Router, better known as the Tor Network, is often thought of as being the dark-side of the web. Not least as the anonymity provided by Tor meant that sites hosted on so-called hidden service servers were free to trade in just about anything from drugs and guns through … | |
There can be no denying the impact that social media has had on business, you only have to look at the reach it has: well over a billion people between Facebook, Twitter and LinkedIn subscribers. What's more, there is no sign of the social media bubble bursting just yet.  but OMG, and not in a good way. This [ASUS Transformer V machine](http://www.pcpro.co.uk/news/389047/asus-reveals-five-in-one-transformer-book-v?) has got to be the maddest idea I've seen for years. > The Transformer Book V is a Windows 8.1 laptop/tablet hybrid, which turns into an Android 4.4 KitKat device … | |
So, we all know about the likes of Facebook, Twitter, Google+ and LinkedIn but outside of the big four what are your favourite 'niche' social networks. By which I mean the social networking sites which address niche markets, which are growing quickly but have not yet really hit the media … | |
Back in the eighties, the Defense Advanced Research Projects Agency ([DARPA](http://www.darpa.mil/)) spent more than a billion dollars in an attempt to create what was, in effect, Skynet. You know, the self-aware artificial intelligence system that goes bad in The Terminator movie. DARPA called it the Strategic Computing Initiative, but it … | |
It's an interesting question, and one that's being raised by Gartner which is predicting that [URL="http://www.gartner.com/it/page.jsp?id=1392716"]the number of wireless e-mail users will reach an incredible one billion[/URL], worldwide, by the end of 2014. A number that's not too hard to accept, given that earlier this year global business wireless e-mail … | |
Not exactly the most surprising news ever, that Anonymous is [planning an all out DDoS war on World Cup corporate sponsors](http://www.independent.co.uk/news/world/americas/world-cup-2014-hacktivist-group-anonymous-plan-cyberattack-on-world-cup-sponsors-9467786.html) during the football tournament. Personally, I wish them luck. Cannot stand football, in fact hate it with a passion and the world cup period is a nightmare every four … | |
Another day, another breach. The latest to disclose that there had been some 'unauthorised access' to systems and internal company data' is music streaming service Spotify. The disclosure itself was something of an odd one, claiming that investigation suggested only a single user's data had been compromised following an issue … | |
Following on from the news that an eBay password database has been compromised, and universal advice from security experts that users should now change their passwords, one thing has been loud clear: the total lack of that password change requirement from eBay. Sign into eBay and there is nothing to … | |
**How do passwords work?** What a password isn't, or at least really shouldn't be, is some kind of secret word or phrase that is simply compared against a table of usernames in a login database. Such plaintext systems are about as secure as a chocolate padlock on a furnace door. … | |
The latest major online outfit to suffer from a breach is Bitly, the url shortening service beloved by users of Twitter and Facebook. According to a statement from Bitly CEO Mark Josephson, the company has "reason to believe that Bitly account credentials have been compromised."  Although Josephson insists … | |
If a week is a long time in politics, then 24 hours is an absolute age in ecommerce security terms. Which make the findings of a Tripwire survey, published today, all the more worrying. The survey, conducted by Atomic Research, questioned 102 financial organizations and 151 retail organizations which process … | |
Here’s the concept behind the smartpen: there are millions of pages of good old fashioned handwritten notes taken every day in business meetings and school lessons around the world. Unfortunately they remain trapped within the confines of the paper they are written upon. But what if you could easily share … | |
Feedly app left attack window open for malicious JavaScript hackers according to one security researcher. Security consultant and blogger Jeremy S [revealed](http://breaktoprotect.blogspot.in/2014/04/feedly-android-application-zero-day.html) that the Feedly Android app, or at least the version prior to the update on March 17th 2014, had been subject to a zero-day JavaScript code injection vulnerability. … | |
As I stated when [reviewing the Minisuit 3-in-1 Folio Case](http://www.daniweb.com/hardware-and-software/tablets-and-mobile-devices/reviews/477039/review-minisuit-3-in-1-keyboard-folio-case-nexus-7-2013#) for the Nexus 7 2013, the most important things a writer looks for in any keyboard are key travel, spacing and feedback. Obviously a travel keyboard throws some additional requirements into the mix such as weight, size and battery life. … | |
For a professional writer of any description, there are three things that matter when it comes to the keyboard that they are using: key spacing, key travel and key feedback. The Minisuit 3-in-1 Folio manages, as far as any such small keyboard is ever going to achieve, to get the … | |
A new member [Scott_6](http://www.daniweb.com/members/1104458/Scott6) asks: > I noticed when I was setting my profile that the control for selecting my year of birth only goes back to '81. Would you know why? > | |
Given the amount of negative press that has been generated since the announcement of the iPhone 5, calling it everything from boring to disappointing and even naming it the Apple Meh!phone, you might be forgiven for thinking nobody would want to buy it. You would be wrong. Very wrong indeed, … | |
From college dropout to one of the world's youngest self-made billionaires, there is no doubting that Facebook founder and CEO Mark Zuckerberg has made quite an impression in his 28 years on this planet. But who is he really? You could go watch 'The Social Network' movie I guess, but … | |
Responding to the publication of a report which shows Amazon, Apple and Microsoft all scoring badly when it comes to a reliance upon 'dirty energy' to power their data centers, Apple has hit back with claims that the report over-estimates the power consumption of iCloud and projects being constructed to … | |
Android-driven devices, including smartphones and tablets manufactured by the likes of Asus, LG, Motorola and Samsung, are being sold with pre-installed malware according to claims made by the CTO and Founder of Marble Security. David Jevans made the claim following complaints from a potential client that a mobile security platform … | |
Wearable computing has been a buzzword for so long that it's easy to get blinded by the hype and not realise that actually it's a reality; and one that got even more real with the announcement by Google of Android Wear. Forget the fitness bands of today and the 'smart … | |
So here I am working on a Sunday morning, as usual, and I when I fire up my laptop (which serves as my desktop) a message appears informing that an update is being applied and it won't take long. Imagine my surprise when it turns out that this update appeared … |
The End.