" data-bs-original-title="" title="">
The latest VIPRE report, detailing the ten most prevalent malware threat detections spotted by [GFI Labs](http://malwareprotectioncenter.com/) and the ThreatNet Detection System, reveals that Google, LinkedIn, Skype and Mass Effect 3 were amongst the big brands being exploited by cybercriminals in order to leverage trust whilst distributing malware-laden emails. As a …
Microsoft Security Advisory notices do not, as a rule, make the media sit up and take much notice. Not least as they have become relatively commonplace over the years, but every now and then one comes along which may grab some press attention. Take [MSA 2718704](http://technet.microsoft.com/en-us/security/advisory/2718704) for example.  …
Over the weekend I wrote a news story for DaniWeb which revealed how the iPhone was vulnerable to SMS text message spoofing. This went under the title "[Why Apple was right about iMessage 'fix' for iPhone SMS spoofing](http://www.daniweb.com/hardware-and-software/apple/ios-iphone-os/news/431373/why-apple-was-right-about-imessage-fix-for-iphone-sms-spoofing)" because, simply put, SMS text messaging is exposed to this kind of …
According to new research from Kaspersky Lab, in the form of a report called [Evaluating the threat level of software vulnerabilities](http://media.kaspersky.com/documents/business/misc/Kaspersky_Lab_Report_Software_Vulnerabilities_final.pdf), 72% of Java users haven't switched to the latest, safest, version despite highly publicised vulnerabilities and resulting security exploits.  And it's not just Java, the report also …
According to the boffins at Kaspersky Lab, users of Android devices running Gingerbread (Android 2.3.6) and Ice Cream Sandwich (Android 4.0.4) are targeted the most by cybercriminals. Gingerbread accounted for 28% of all the attempts to install malware that were successfully blocked by Kaspersky, while Ice Cream Sandwich accounted for …
Microsoft has been slowly moving away from the desktop PC software market for many years now, and with the recent launches of Windows 8 and the Surface tablets, along with the latest Windows Phone devices, the whole mobile and touch arena has taken quite a bit of the consumer-oriented focus. …
One of the Internet's biggest online dating sites, eHarmony, has confirmed that security has been breached and member passwords compromised. eHarmony spokesperson Becky Teraoka says that "a small fraction of our user base has been affected" although I am led to understand that the 'small fraction' in question is actually …
As a three times winner of the IT Security Journalist of the Year award in the UK, I am used to writing about all kinds of scams. Whilst most of them try and weasel their way into the bank accounts of the victim through purely online means, increasingly the bad …
Acronis responds to DaniWeb questions regarding a leak of customer data which, [as we exclusively reported over the weekend](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/427455/breaking-acronis-blames-technical-issue-for-customer-data-leak), resulted in some information being indexed by search engines and accessible to anyone on the Internet.  Although the leak itself was identified by Acronis on Friday 29th June, the …
Recently we have all become somewhat over-exposed to the leaking of customer data courtesy of inadequate security allowing hackers to gain access to databases. The [LinkedIn LeakedOut leak](http://www.daniweb.com/internet-marketing/social-media-and-communities/news/425019/linkedin-confirms-six-million-password-hack-check-if-yours-is-one-of-them) and [eHarmony dating data disaster](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/425118/dating-disaster-eharmony-confirms-passwords-exposed-by-linkedin-hacker#post1817377) are good examples of the genre. However, let's not forget that sometimes no hackers are required to …
Ask a group of 100 people how they search for images online and the chances are that the vast majority will give the standard 'Google' response. Indeed, Google Images is a useful search engine if you are satisfied with a scattergun approach to finding all images that match a specific …
Anyone who uses Twitter, and has at some point posted a link to something interesting, will have almost certainly used a URL-shortening service such as bit.ly for example. Now the spammers are exploiting the popularity of such link-reduction services by establishing their own fake URL-shortening services in order to redirect …
Last year saw the overall volume of email delivered spam drop for the first, which has to be good news. Or it would be were it not for the fact that spammers have not gone away, they have merely moved with the times and adapted their business so as to …
News reports suggest that March has been a good month for lovers of, and developers for, the Android operating system in pretty much every regard. That good news comes at the expense of the Apple iPhone and iOS we are led to believe, which appears to be losing the fight …
The Kogan Agora 7 inch Android tablet has been kicking up something of a storm even before it has actually shipped. Not least because of the pricing. The Australian company is attempting to break into the UK market and is marketing the device as [URL="http://www.kogan.co.uk/shop/7-inch-tablet-pc-android/"]the best value Android tablet[/URL] in …
Looks, I am often told, can be deceptive. This is certainly the case as far as the Microsoft Arc mouse and the new Arc Touch mouse are concerned. Sure, at first glance there is not much different about the two in terms of that innovative arcing design; but look closer, …
Internet Explorer used to reign over the web browser client kingdom with a seemingly vice-like grip, but the latest statistics suggest that the Microsoft market share crown is slipping significantly. Although Chrome only has a 7.98 percent share according to one recent report, it has carved that out in a …
The Swiftpoint Mouse is primarily designed with one purpose in mind, and that is to replace the touchpad on your laptop or netbook. Indeed, unlike any mouse I've ever used (and that includes the smallest of portable units) the Swiftpoint can be comfortably operated within the confines of the palmrest …
Rather than cover all the same ground again, may we take the liberty of referring you to [URL="http://www.daniweb.com/reviews/review280960.html"]our earlier review of System Mechanic 9.5[/URL] which provides all the basics of what the software is and what it does? In a nutshell though, System Mechanic is a collection of diagnostic, repair …
Wireless is, without doubt, a really great thing. Apart from when it doesn't work that is. If you live in a big old house, for example, then getting your WiFi signal to extend through a few thick walls from one end of the place to the other is not always …
When it comes to data storage and retrieval the current buzz is undoubtedly cloud-shaped, so why would anyone want to invest in Network Attached Storage? Two words: cost and capacity. Cloud services are great, but as far as storing and accessing large amounts of data is concerned things can get …
What do you get if you combine a computer company with a group of Vegans and someone who used to present a popular children's TV show? The less than obvious answer is a Linux computer designed especially for old people. But there you have it, and according to the press …
Justin Bieber is, so my 10 year old daughter informs me, a pop sensation. Actually, her exact words when I asked just who the heck this Bieber bloke who keeps topping the Twitter trending chart is were: Oh My God, Justin Bieber, he's gorgeous. A little more journalistic investigation turned …
OK, so Apple has done it again. Whipped the technology and consumer media up into a feeding frenzy that is. But has it delivered with the truly magical and revolutionary product that was promised? Er, no dude, not by a long shot and here (in no particular order) are 15 …
iPad users in the USA have found themselves caught up in a security gaff which saw subscriber data of some 114,000 of them exposed for anyone to see. Subscriber data such as email addresses the Integrated Circuit Card ID that authenticates them on the AT&T network. The security researchers which …
Those of us who can remember when Internet access meant slow dial-up modems connecting via pay per minute service providers will also be all too familiar with the concept of the porn dialler. For the youngsters out there, these took advantage of the fact that most punters had no idea …
The End.