1,440 Topics
Exploit-based attacks are on the up (1), the majority of IT security professionals aren't sure if they can detect attackers attempting to breach the network (2), and 65% of companies let the tech support department give security training to staff. I would suggest, in order to make some sense of … | |
In what has been called by some commentators the ‘most significant update in five years’ the latest version of Python finally come of age. Python 2.5 not only apparently fixes some 450 bugs discovered since the 2.4 release was, err, released, but also throws in some 350 patches for good … | |
When [Exponential Interactive](http://exponential.com/), an advertising intelligence provider, analysed the actual behaviour of more than two million Brits viewing Grand Theft Auto content online, the [results](http://meteorpublicrelations.com/wp-content/uploads/2013/10/GTA-insights-from-Exponential.jpg) were rather surprising.  Here are the key conclusions: The GTA audience are 33% more likely than the average internet user to have children; … | |
Are smartphones becoming thought of as disposable items these days? Research from one UK-based online auction site, BidGrid, would seem to suggest that Brits at least regard their gadgets, including mobile phones, as such. Indeed, BidGrid goes as far as to state that the UK is a throwaway nation with … | |
According to research covering more than 100 universities across the globe from earlier this year, 58% of the academic leaders questioned believed COBOL programming should be on the curriculum. Yet only 27% could confirm that was the case, and only 18% had COBOL as a core part of the course … | |
Gartner defines the '[Nexus of Forces](http://www.gartner.com/it-glossary/nexus-of-forces)' as being "the convergence and mutual reinforcement of social, mobility, cloud and information patterns that drive new business scenarios". The global IT analyst outfit has also just released details of research which suggests that the perceived level of maturity when it comes to the … ![]() | |
Your web browser provides a window onto the Internet, but unless you are timely in updating the client you use then, say researchers with security vendor Kaspersky Lab,that window may be cracked and allow a draft of insecurity to blow through into your network, your computer and your data.  Forget the new colours that everyone is drooling over (gold? really? … | |
While the News International [phone hacking scandal](http://www.guardian.co.uk/media/phone-hacking) that saw the demise of the News of the World newspaper cannot have escaped your attention in the US or UK, news from India concerning the latest 'tumble and clone' developments could leave the mobile phone calls of more than just celebrities at … | |
Small groups of what are best described as cyber-mercenaries, willing and able to perform surgically precise hit and run hacking operations, are offering their services for hire out of China, Japan and South Korea. That's the conclusion of security researchers at [Kaspersky Lab](http://www.kaspersky.co.uk/) who have been following the progress of … | |
A jury in the US has, after just three days deliberating, ruled that Samsung must pay Apple more than $1 billion in damages. The lawsuit had focussed on alleged patent infringements by Samsung in terms of both software and design relating to Apple's iPhone and iPad devices. Although not all … | |
I'm sure everyone would like to join me in welcoming the newest member of the DaniWeb moderating team, and a much deserved appointment it is too: [JorgeM](http://www.daniweb.com/members/929775/JorgeM) | |
A Freedom of Information request from staff at the UK offices of the Huffington Post has revealed, according to a BBC report on the story, that more than 300,000 attempts were made to access pornographic websites from the Houses of Parliament during the last 12 months. Of course, just looking … | |
UK home shopping pioneers Lakeland have sent an email to all customers past and present to warn them that the retailers website has been hacked. What Managing Director Sam Rayner calls a "sophisticated and sustained attack" took place late on Friday 19th July. Measures were taken at the time to … ![]() | |
Users of online banking services are at risk from a new 'in the wild' Trojan, Hesperbot, which has been discovered by the ESET malware research lab. Researchers have found that infections of users in Turkey are currently most rife, with users in the Czech Republic, Portugal, Thailand and the United … | |
Within days of the New York Times website suffering an outage which was widely reported as being down to another cyber attack, although the NYT itself insists it was actually an internal issue following system maintenance, media sites belonging to CNN, Time and the Washington Post have been attacked by … ![]() | |
According to the fourth annual [Web Application Attack Report](http://www.imperva.com/download.asp?id=419) from Imperva retailers suffer from twice as many SQL injection attacks when compared to other industry sectors. What's more, the United States remains the number one source of all web attacks. Other key findings of the report include the startling revelation … ![]() | |
Java vulnerabilities have hardly been out of the news during the last year. Here at DaniWeb we've covered a number of the stories as they surfaced: [Java in the cross-hairs: the security debate rolls on](http://www.daniweb.com/software-development/java/news/445532/java-in-the-cross-hairs-the-security-debate-rolls-on), [Is Java 7 still insecure? Oracle Patch doesn't fix underlying vulnerability](http://www.daniweb.com/software-development/java/threads/432479/is-java-7-still-insecure-oracle-patch-doesnt-fix-underlying-vulnerability), [Update my insecure Java … | |
FireEye Labs has released a set of tools with the sole purpose of helping organisations detect and examine infections by the Poison Ivy RAT. Cleverly called Calamine, this collection of free tools promises to give security professionals the opportunity to identify the indicators of a Poison Ivy attack including the … | |
Research published today by data governance software developer Varonis reveals that, when it comes to the virtualized environment, security awareness appears to be something of a black hole. The [study](http://eu.vocuspr.com/Publish/517692/vcsPRAsset_517692_109957_85137914-8b53-4005-b292-0c87aa89763a_0.png) found that data security in these virtualized environments can all too often be totally neglected, and some 48% of IT … | |
Security researchers at ESET [have revealed](http://www.welivesecurity.com/2013/05/16/targeted-threat-pakistan-india/) that a prolonged and highly targeted data stealing attack aimed at Pakistan, using fake PDF documents, appears to have originated in India. Using a code signing certificate (issued to what looks like a legitimate company 'Technical and Commercial Consulting Pvt. Ltd') to sign malicious … | |
First there was a year of hype surrounding Project Natal, but the reality that is Microsoft Kinect has been in my family home for a week now. Everyone from my 10 year old daughter to my retired mother-in-law have played with it, so what's the verdict? Is this the future … | |
So, while I was away from the office last week a parcel arrived. A parcel containing the latest incarnation of the Parrot AR Drone for me to review for DaniWeb. Not mine to keep, just to play with for a few days. Which is probably just as well because, to … | |
A couple of years ago, a 17 year old was arrested for his part in a denial of service attack against gamers playing the online multiplayer version of Call of Duty: Black Ops. The teenager was accused of selling cheat software called 'Phenom Booter' which prevented others from playing (it's … | |
Fast food chain KFC has had more than its fair share of Kentucky Fried WHAT? myths busted over the years. However, some of the stories turn out to be genuine such as the [breaded and deep fried kidney](http://www.huffingtonpost.com/2013/01/07/ibrahim-langoo-brain-kidney-kfc_n_2425917.html) that was discovered by Ibrahim Langoo in a KFC in Colchester, England … | |
Could be related to current system tweaking efforts, but just in case: PM notifications are broken on-site. Email notifications coming through OK, but there are now no indications on-site of new messages without actually dropping into the Private Messages section itself. | |
The whole culture of Bring Your Own Device (BYOD) in the workplace has reignited the mobile device security debate. Although there are many ways to protect data, the first line of defence when a mobile device (be it a tablet or smartphone) is lost or stolen is almost always going … | |
Back in December 2011, reports were circulating regarding a data breach at one of the big Chinese social networking sites, Tianya.cn that suggested the login credentials of some 40 million users were potentially exposed. Clear text usernames and password combinations were stolen by hackers during the breach, although a Tianya … | |
A successful tournament poker player from Japan, with earnings estimated at $1.5 million from his prowess at bluffing and holding his nerve under pressure, has been arrested and charged with being behind an Android malware distribution operation that netted even more: $3.9 million according to Symantec. The Chiba Prefectural Police … | |
According to a new survey of more than 2,000 British workers, 38% of them insisted they were 'content' with their career progression. When it comes to the tech sector, 39% were happy with their career ladder climbing which, according to Randstad Technologies which carried out the research, makes them happier … | |
[](http://www.perforce.com) Perforce Software has today shared five essential tips for software development teams to consider by way of spring cleaning the development environment. These management guidelines are designed to help maintain well-organized codebases as well as improving the overall development process. Randy DeFauw, senior product manager at Perforce … | |
My Private Messages counter (at top of page) wasn't showing any new messages when I logged on just now, nor did the 'you have a new PM wanna read it' box pop up. However, I did have a bunch of unread new PMs sitting in my inbox (email notifications told … | |
Writing in the latest edition of Vanity Fair, [Kurt Eichenwald states](http://www.vanityfair.com/business/2013/05/facebook-future-mark-zuckerberg-sheryl-sandberg) that Facebook has "quietly been pioneering a marketing business model unlike any other" and goes on to praise the social networking Goliath for developing new targeting techniques that give "advertisers an unprecedented ability to reach only the potential audiences … | |
If you were asked to paint a verbal picture of the Internet in just five words, would they be porn, drugs, spam, Twitter and zombies? After analyzing an amazing two billion emails a day for three months, that's the image arrived at by one research outfit. [attach]15822[/attach]The latest [URL="http://www.commtouch.com/download/1753"]Internet Threat … | |
New research by [Varonis](http://www.varonis.com/) has revealed that only 25% of those companies questioned were able to answer yes to the question: "Are you able to detect when files containing sensitive data are uploaded to a third party cloud service?" Which left a staggering three-quarters of businesses in the dark about … ![]() | |
Global online cash provider [Ukash](http://www.ukash.com), founded in 2001 and with a presence in more than 50 countries across 6 continents, has warned users not to get scammed by a loan company con doing the rounds at the moment. Ukash works on a code basis, with the user buying a voucher … ![]() | |
Konami, the Japanese games developer responsible for such genre defining classics as Metal Gear Solid and Silent Hill, has confirmed that tens of thousands of customer accounts have been put at risk due to a breach of the Konami ID portal site. During a period between the 13th June and … | |
The PowerBank 2000 is the latest in a long line of solar-powered chargers from Sandberg. It's far from being the most powerful backup battery for your smartphone (and yes it will charge Droids as well as iPhones, but as I'm an iPhone user I can only talk about my experiences … | |
So, you've either bought the [brand new iPhone 5](http://www.daniweb.com/hardware-and-software/apple/apple-hardware-and-devices/news/433802/apples-disappointing-iphone-5-sells-out-within-the-hour) or have upgraded your existing iPhone to iOS 6 and discovered, like half the Internet it would appear, that the new Apple Maps which have replaced Google Maps are, to be polite, an utter and total stinking FAIL. I'm no Apple … ![]() | |
Although the Opera web browser client is no longer the big 'little player' that it used to be having long since been eclipsed by the likes of Chrome and Firefox in the Internet Explorer alternatives stakes, it can still claim more than 300 million users and a place as world’s … ![]() | |
The news that, following a number of pretty high-profile password compromise cases, Twitter is adopting a two-factor authentication for account access is to be welcomed. 2FA, as it is known, applies the better security concept of something you know combined with something you own into the access equation. The thing … | |
<rant> Does the 'You have a new Private Message' alert come with a toggle switch somewhere to turn it off? Other than dismissing it directly from the alert itself I mean? Every time I go back to the inbox after having read a PM it pops up again telling me … | |
There are precious few archaeologists in Japan, and only a handful who produce their own software programs to analyze geographic information. One who does is Professor [Izumi Niiro](http://www.okayama-u.ac.jp/user/arch/about/niiro.html) of the Okayama University. A convert from Perl, Professor Niiro now uses Python to perform data analysis via the Geographic Resources Analysis … | |
KitSound takes music seriously, so I wasn't that surprised when I read how in recent 'blind testing' consumers were unable to tell the difference between a set of KSDJ headphones costing under £20 and high end headphones costing up to £900 when it came to the audio output. I mention … ![]() | |
DaniWeb, the 10 year old IT discussion community with more than a million members, is always looking forward and never stops introducing new features and functions for users. When spammers managed to get the better of the (highly customised) vBulletin forum platform which had been driving DaniWeb since the get … | |
It started as just another early morning at work, arriving at 5.30am outside the converted mill where I rent a small space in amongst the myriad industrial units and office lets. I pulled up outside in my Fiat 500 and removed my backpack that doubles up as my laptop case … ![]() | |
Almost exactly a year ago I was writing about [the development of Google Glass](http://www.daniweb.com/hardware-and-software/pc-hardware/monitors-displays-and-video-cards/news/426788/no-google-glass-for-most-developers-until-2014) here at DaniWeb. In the meantime, the project has turned into a reality and [actual product has got into the hands of reviewers](http://www.pcpro.co.uk/features/380401/before-iwatch-and-google-glass-wearable-computing-milestones-and-failures/2) and some lucky users with $1,500 to spare. This would all be much … ![]() | |
I will be at the National March Against the Badger Cull in London this Saturday (1st June) - see http://www.londonagainstthecull.org.uk/ for details. If any UK-based DaniWeb members are going, say hello if you spot a guy with an eye-patch and tattooed head. Chances are pretty good it will be me... | |
The latest VIPRE Report from [GFI Labs](http://www.gfi.com) suggests that 2013 started off as a bad year for social network-based cybercrime attacks. The report, which analysed the ten most prevalent threats detected during the month of January, identified phishing messages on both Twitter and Facebook as well as malicious spam messages … | |
 This is the latest upgrade to the Camera Link product from Sandberg, making it compatible with the iPad 3 and iPad 4/Mini; but not at the same time. To get the iPad 4 compatibility rather obviously requires the Lightning connector equipped version, which costs the same as the … |
The End.