1,440 Topics
When you look at the iTunes download charts you will always find an Angry Bird perched towards the top. That's quite simply because this game app has been the undoubted number one commercial and cultural success story of the App Store. The app developers, Rovio, have been accused in the … | |
FireEye security researchers are warning that they have [detected a new zero-day vulnerability](http://blog.fireeye.com/research/2013/02/yaj0-yet-another-java-zero-day-2.html) that is being used successfully in the wild against browser clients with both Java 6u41 and Java 7u15 installed. Given that the Java 7 update was only released a couple of weeks ago, this is yet more … | |
Reports are coming in thick and fast about 'state-sponsored' zero-day exploits hitting business websites in the UK. The latest, disclosed yesterday by [SophosLabs](http://nakedsecurity.sophos.com/2012/06/20/aeronautical-state-sponsored-exploit/), involves an as yet unnamed European aeronautical parts supplier and follows on from another the day before involving a European medical company site. In both cases the … | |
Last week saw the discovery of YAJE: Yet Another Java Exploit. Sadly, Java vulnerabilities are neither new nor uncommon and the bad guys are quick to exploit them in the wild. Some claim that Oracle is in too much of a rush to extricate itself from this unholy mess and … | |
With Twitter now more than 100 million accounts strong, and with 50 million Tweets per day, you might be excused for thinking there's no stopping the micro-blogging network. Until, that is, you start exploring the darkside of Twitter. But is Twitter evil? [attach]16201[/attach]You only have to look at the IT … | |
Whether you travel on business or for pleasure, the chances are pretty high that you will make use of the Internet while abroad. If you are staying at a hotel then, given the high cost of international data roaming on most mobile networks, the chances are that you will make … ![]() | |
The news wires have been buzzing over the weekend after it emerged that the Raspberry Pi website had been hit by a 'million zombie' Distributed Denial of Service (DDoS) attack during the week. Although the outage was relatively brief, with the Raspberry Pi Foundation admitting the attack with a Twitter … ![]() | |
Microsoft Security Advisory notices do not, as a rule, make the media sit up and take much notice. Not least as they have become relatively commonplace over the years, but every now and then one comes along which may grab some press attention. Take [MSA 2718704](http://technet.microsoft.com/en-us/security/advisory/2718704) for example.  … ![]() | |
With the London 2012 Olympics due to open in just a few days time, the expected push by the bad guys has started. No, I don't mean the banning of wearing Pepsi T-Shirts in the Olympic Stadium as it might upset official sponsors Coke, or the fact that nobody is … ![]() | |
An ongoing attack aimed at users of the Apple Mac platform is being reported by security researchers. [AlienVault,](http://www.alienvault.com) which has discovered these weaponised attacks in the wild, warns that regular Mac users without IT security software installed could be at risk of infection and hijacking.  The researchers suspect … ![]() | |
According to security experts at data governance outfit Varonis, 2013 will be the year of the salami attack. On the plus side, they also predict that the world will not come to an end on December 21st 2012. It's not just salami that your business needs to worry about in … | |
Earlier this week, an iPhone jailbreaking guru called pod2g revealed how even the very latest beta versions of iOS 6 cannot prevent the iPhone from being vulnerable to SMS text message spoofing. This technique is often employed by spammers and scammers alike when targeting the smartphone user in order to … ![]() | |
It has been a day of coming and going at Google, it seems. Saying hello, again, was Gmail in the UK while Google Docs offline access through Google Gears has waved goodbye. You might think that Gmail had never left the UK, but the truth is that apart from a … | |
Continuing our round up of 2013 IT security vendor predictions, we've got the thoughts of three of the big Infosecurity Europe exhibitors: Palo Alto Networks, SafeNet and Kaspersky Lab.  Brian Tokuyoshi from Palo Alto Networks predicts that social media, data decryption and virtualised network security will be high … ![]() | |
Anonymous hacktivists took aim at the websites of the UK Justice Department, the Department of Work and Pensions, the Home Office and even the Prime Minister's own Number 10 site. All of them were successfully targeted overnight and went down for a period of time. The attacks were part of … ![]() | |
Over the weekend I wrote a news story for DaniWeb which revealed how the iPhone was vulnerable to SMS text message spoofing. This went under the title "[Why Apple was right about iMessage 'fix' for iPhone SMS spoofing](http://www.daniweb.com/hardware-and-software/apple/ios-iphone-os/news/431373/why-apple-was-right-about-imessage-fix-for-iphone-sms-spoofing)" because, simply put, SMS text messaging is exposed to this kind of … ![]() | |
First we had the news that [URL="http://www.daniweb.com/news/story276878.html"]IBM was helping clean up crime[/URL] in the US and UK, now it seems that Sweden is getting a touch of the Big Blue Brother effect. The city of Stockholm is launching a project using IBM's streaming analytics technology in order to gather real-time … ![]() | |
I am pleased to report that DaniWeb, based about half an hour outside Manhattan in Uniondale, Long Island, New York has survived Hurricane Sandy. There were no downtimes or outages, and all staff are OK. Not everyone in the tech space has been so lucky it would seem.  … | |
Apple, Facebook and Twitter have all been the target of hackers recently, and now Evernote has admitted to a potential breach that has forced it to reset the passwords of approximately 50 million registered users. Evernote, a kind of web scrapbook that enables you to take notes, save web pages … ![]() | |
New research from ISACA suggests that US consumers with 'work-supplied' computing devices intend, on average, to spend nine hours shopping for gifts on them during the forthcoming holiday season. When it comes to the Bring Your Own Device (BYOD) brigade, those who use personal mobile devices for work, that average … ![]() | |
Security vendor Malwarebytes has reported that a new variation of an old password stealing Trojan is out in the wild, but all is not as it may seem. Notably, this particular Trojan is signed with an apparently 'genuine' digital certificate that authenticates the file. Which rather prompts the question: "say … ![]() | |
...and the Microsoft AJAX Library, err, and the ASP.NET AJAX Control Toolkit. Yep, Microsoft has not only finally come up with an official name for the AJAX technologies which until now have been known collectively as ‘Atlas’ but has also split it into three individual products. All are expected to … ![]() | |
IT Security experts Barracuda Labs recently researched the business of selling Twitter followers to those companies which cannot wait to build organic follower growth. Despite the purchasing of Twitter followers being an explicit breach of the Twitter terms and conditions of use, punishable by the deletion of the account concerned, … ![]() | |
The 'World's Greatest Anti-Malware Software' is the spurious claim being made by Malwarebiter, which just so happens to sound an awful lot like Malwarebytes which could perhaps justifiably lay claim to that accolade. Take a look at this forum and you will see that Malwarebytes is a very valuable tool … | |
It's going to be a great Easter for Modern Warfare 2 gamers, and that's official. Robert Bowling, Creative Strategist at Modern Warfare 2 developers Infinity Ward, has [URL="http://twitter.com/fourzerotwo/status/10738022531"]posted confirmation on Twitter[/URL] that for the weekend of April 2nd to 5th there will be double experience points on offer to players … | |
According to IT security outfit Kaspersky, which has just [published details](http://www.securelist.com/en/analysis/204792255/Kaspersky_Security_Bulletin_2012_The_overall_statistics_for_2012) of the information security landscape as it was shaped during 2012, 99% of all mobile malware threats now target Android devices. With 6300 new mobile malware samples discovered every month on average across 2012, Android has become the focus … | |
According to new research from Kaspersky Lab, in the form of a report called [Evaluating the threat level of software vulnerabilities](http://media.kaspersky.com/documents/business/misc/Kaspersky_Lab_Report_Software_Vulnerabilities_final.pdf), 72% of Java users haven't switched to the latest, safest, version despite highly publicised vulnerabilities and resulting security exploits.  And it's not just Java, the report also … | |
According to new independent research commissioned by Corero Network Security, and conducted by the Ponemon Institute, two thirds of banks in the United States have suffered a Distributed Denial of Service (DDoS) attack during the last 12 months. The 64% statistic refers to the number of IT and IT security … ![]() | |
Continuing with our round up of the IT security vendor view of the year to come, here's how PandaLabs, the malware research laboratory arm of [Panda Security](http://www.pandasecurity.com/), sees 2013 stacking up in terms of threats and exploits.  Perhaps unsurprisingly, PandaLabs predicts that 2013 will be much the same … ![]() | |
A week may be a long time in politics, but 18 months is an absolute aeon as far as computing is concerned. Back in October 2010 here at DaniWeb I was posing the question of whether the newest [Amazon Kindle could be an iPad killer](http://www.daniweb.com/hardware-and-software/tablets-and-mobile-devices/reviews/315078/amazon-kindle-3-better-than-the-ipad) and came to the almost … | |
This special edition of the Guinness World Records book will appeal to geeks and nerds the world over. Not just because it is packed full of the kind of trivia that we all thrive on in social situations, but also because that trivia is firmly based in the realm of … | |
Over the last couple of days the online media seems to have gone crazy for the news that the Google Chrome web browser client has overtaken Microsoft Internet Explorer to become the most popular browser on the planet. This based entirely upon the fact that, for a single week, and … | |
Remember when you had to use a whole host of 'utility downloads' just to keep your PC running smoothly? Windows has had optimization tools built in for ages now, so surely the days of PC optimization suites are long over? Not so according to iolo, which has just released System … | |
Since last fall, Google has either closed down or combined more than 30 different products. If you thought that was the end of the axe wielding, think again: another bunch of Google technologies are to bite the dust.  According to the General Manager of Global Enterprise Search at … | |
New research based upon the findings of the [Guardian UK300](http://targetjobs.co.uk/uk300/home) has revealed that IT students in the UK most want to work for Google, Apple, Microsoft, IBM or Intel in that order. Failing that, then they would like to end up working with MI6 (the Secret Intelligence Service), MI5 (the … | |
The UK-based [Surrey Police Force](http://www.surrey.police.uk/) has long since embraced Internet culture as being a way to help fight crime. It has an online crime reporting tool, active accounts on Facebook and Twitter, as well as a video channel on YouTube. But now it has moved into smartphone territory in order … | |
Here's a weird one: the latest review that I have just put up [here](http://www.daniweb.com/hardware-and-software/tablets-and-mobile-devices/reviews/443411/why-have-i-been-using-a-paintbrush-on-my-ipad) includes three images of the item being reviewed. These render perfectly fine in the editor, but are missing from the published review. Dani/James(1)/James(2) care to take a look and see what's happening? | |
Network security vendor [Stonesoft](http://www.stonesoft.com/en/) predicts that the top infosec threats to watch out for in 2013 will include unseen and unknown targeted cyber-attacks, espionage and hacktivism. Jarno Limnell, director of cyber-security at Stonesoft, reckons that in 2013 the security of the digital world will become an even more pressing issue, … ![]() | |
An in-the-wild exploit targeting a vulnerability with Java 7 has led to security experts the world over warning users to disable the Java plug-in for their browser clients at the very least, and preferably uninstall Java altogether. The CVE-2012-4681 vulnerability, comprising two flaws, along with a couple of other 'related … | |
According to the boffins at Kaspersky Lab, users of Android devices running Gingerbread (Android 2.3.6) and Ice Cream Sandwich (Android 4.0.4) are targeted the most by cybercriminals. Gingerbread accounted for 28% of all the attempts to install malware that were successfully blocked by Kaspersky, while Ice Cream Sandwich accounted for … | |
If you take one look at the deadmau5 portable speakers from KitSound and immediately think that they have been inspired, somewhat badly, by Mickey Mouse then I'm afraid you are showing your age and lack of cool. If, on the other hand, you are some hip young thing then you … | |
Microsoft has released YAIESA, or Yet Another Internet Explorer Security Advisory if you prefer. This time, [SA2757760](http://technet.microsoft.com/en-us/security/advisory/2757760) warns about a new zero-day out there in the wild which impacts all users of Internet Explorer 9 and earlier versions. It's the usual case of targeted attacks being spotted which could lead … | |
Microsoft has been slowly moving away from the desktop PC software market for many years now, and with the recent launches of Windows 8 and the Surface tablets, along with the latest Windows Phone devices, the whole mobile and touch arena has taken quite a bit of the consumer-oriented focus. … | |
My name is Davey Winder, and I am a phoneaphobic. At first glance it would appear that I am anything but alone if the results of a recent study into attitudes towards mobile phone usage are to be believed. But first impressions are often misleading and that's the case here, … | |
Oh dear, oh dear, oh dear. What has happened to Welsh rugby? It all looked so promising last year. | |
[ATTACH=right]15223[/ATTACH]The box that the HandShoeMouse arrived in proudly claims that this is "the only mouse that fits like a glove" although I'd take issue with that. You don't wear it like a glove, but rather it wears you. The glove analogy does hold up when it comes to the pre-purchase … | |
The results of a new security survey, which asked some 6,000 people across Europe questions about cybercrime, would appear to suggest that nearly everyone (88% of respondents in fact) is some kind of online victim. Have things really got this bad, or is it just another case of the security … | |
The world's largest digital jobs survey, using data extracted from more than 230,000 jobs posted to The Freelancer.co.uk site, reveals some interesting hiring trends in the developer sector.  According to the latest Freelancer Fast 50 survey, if you are a mobile apps developer than it's pretty good news … | |
Microsoft failed to make tablets work with Windows for PEN Computing twenty years ago, so why are some people saying that it is set to dethrone the iPad later this year? Can Windows 8 really prove to be a commercial threat to iOS? [ATTACH=RIGHT]24152[/ATTACH]I still have my Compaq Concerto from … | |
Earlier this year Jonathan Evans, the Director General of MI5 (the UK Security Service), warned that cyber attacks against UK plc were as much of a security challenge as terrorism as far as Britain was concerned. He claimed that UK businesses were being targeted at an 'astonishing' rate driven by … |
The End.