1,082 News Story Topics
Remove Filter It is [URL="http://happygeeknewmedia.blogspot.com/2008/06/google-android-mobiles-face-lengthy.html"]no secret[/URL] that Google is facing problems with the Open Source Android cellphone project. Manufacturers finding it hard to meet deadlines delivering the handsets themselves, and developers finding it hard to work with Google and get Android compatible applications ready. Now, just to add to a week of … | |
Sorry, Obama and McCain are Twitterers. That's what I should have said. Or at least that's what [URL="http://www.techpresident.com/blog/entry/26569/breaking_pdf2008_hosts_obama_mccain_twitter_debate"]Tech President[/URL] reckons. Representatives of both candidates are apparently both hard at it, debating the presidential race on Twitter. The debate started on Friday and is due to run until Tomorrow. Moderated by … | |
According to [URL="http://www.bt.com"]BT[/URL] the average UK office worker sees less sun than the average coal miner. The growing trend of 'chain-desking' where workers feel that being out of the office is the same as being out of touch, is blamed for the vampire-like existence. The research was conducted on behalf … | |
Sandro Gauci, founder of [URL="http://enablesecurity.com"]EnableSecurity[/URL], has revealed that six years on from his 2002 report into extended HTML form attacks the problem has simply refused to go away. The original report included details of how attackers could abuse non-HTTP protocols in order to launch Cross Site Scripting attacks, even in … | |
[URL="http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/"]Multiple arbitrary code execution vulnerabilities in Ruby[/URL] have been revealed by the [URL="http://www.apple.com/support/security/"]Apple Product Security[/URL] team which could lead to Denial of Service attacks. A total of five vulnerabilities have been reported, with versions impacted being: [INDENT]1.8.4 and all prior versions 1.8.5-p230 and all prior versions 1.8.6-p229 and all prior … | |
Amazingly, according to [URL="http://www.theinquirer.net/gb/inquirer/news/2008/06/20/teen-faces-years-hacking"]The Inquirer[/URL], an Orange County hacker is facing an incredible 38 years in prison if found guilty of several counts relating to hacking into his school computer. It seems that Omar Khan, 18, of Coto de Caza, California hacked into computer in order to change his grades. … | |
It has not been a good couple of weeks for Microsoft, at least not when it comes to how the online search space is fanning out anyway. Following on from the refusal of yahoo to take the Microsoft buy out bid seriously, comes the news that it is jumping into … | |
There ain't no such thing as a free lunch, as I learned a long time ago while eating my soup and being forced to listen to a product pitch from some marketing droid straight out of college. I thought I was going to get an inside edge on technology developments … | |
Following announcements at the [URL="http://www.microsoft.com/events/teched2008/itpro/default.mspx"]Microsoft Tech Ed IT Professionals 2008[/URL] conference in Orlando this week, it would appear that Internet Explorer 8 will concentrate on getting things right for the business user. This means a focus on deployment issues, a focus on improving compatibility and updates to the IE admin … | |
With Father's Day here in the UK fast approaching (hint for my own kids: it's on Sunday!) research published today by the world's 2nd largest digital music store, [URL="http://www.emusic.com"]eMusic[/URL], suggests that nearly half of us lie about the music we have on our iPod. It seems that us Dads are … | |
Where are Mulder and Scully when you need them to investigate a mystery? The paranormal technology happening I am referring to is the strange case of the UK House of Lords publishing [URL="http://www.youtube.com/UKParliament"]a handful of short videos[/URL] on YouTube. The idea is OK, in that it has been designed to … | |
Andrew Cuomo, New York Attorney General, has been fighting one of those fights that you sadly cannot win: to rid the Internet of child pornography. Believe me, as a father of four I would love to say that it was possible but as a technology journalist with some 20 years … | |
Google has [URL="http://mail.google.com/mail/help/about_whatsnew.html"]made 13 new features available[/URL] to users of its Gmail service, although you do have to dig into the 'labs' settings in order to enable them. Remember also that Gmail is one of those long-term Beta test services that Google seems to specialise in (although word is that … | |
[URL="ttp://www.kaspersky.com"]Kaspersky Lab[/URL] is warning the public at large to be on the lookout for a new version of the blackmail virus Gpcode which has started to appear in the wild. This particularly nasty twist on the virus format encrypts your files using an RSA encryption algorithm, this time with a … | |
[URL="http://www.verdict.co.uk"]Verdict Research[/URL] has published a report which suggests that the credit crunch is benefiting web-based businesses as consumers in the UK flock to the Internet in search of money saving bargains. With £15bn ($30bn) spent online by UK consumers in the last 12 months, [URL="http://www.startups.co.uk/6678842909857992097/online-sales-rise-by-a-third.html"]according to the research[/URL], this equates … | |
The [URL="http://www.oecd.org/dataoecd/53/34/40724457.pdf"]Malicious software (malware): a security threat to the Internet economy[/URL] report published by the Organisation for Economic Co-operation and Development over the weekend suggests that the PC malware infection rate in the US has hit 25 percent. These OECD cybercrime infection findings are highly disturbing, admits Geoff Sweeney, CTO … | |
According to reports the most serious forthcoming threats to IT security will be revealed during the Gartner Security Summit in Washington this coming week, and it looms like the consumerization of IT will be right there front of stage. Something that Gartner research fellow, John Pascatore, describes as the Gen … | |
Set a Firefox world record on Download Day is [URL="http://blog.mozilla.com/blog/2008/05/28/set-a-firefox-world-record/"]the message being trumpeted[/URL] loud and clear from Mozilla HQ as the launch of the Firefox 3.0 web browser gets ever closer. It seems that the Mozilla people are serious as well, with talk of an official Guinness World Record ratification … | |
File under the strange things that social networking sites think will stop sex offenders, or maybe that should be really stupid things because Faceparty has [URL="http://www.out-law.com/page-9136"]reportedly[/URL] deleted the accounts of most of its users who are over the age of 36 for just that reasoning. Yep, although it beggars belief, … | |
[URL="http://searchsecurity.techtarget.com.au/articles/24758-Telstra-distributes-malware-infected-USB-drives-at-AusCERT"]Reports are filtering through[/URL] that delegates at the annual Australian AusCERT security conference were given USB sticks replete with malware. It would appear that the Oz telco Telstra handed out the memory sticks, unware of the malware payload, during a security tutorial of all things. The malware apparently took advantage … | |
In a [URL="http://www.computerworld.com.au/index.php/id;649220418;fp;16;fpid;1"]comprehensive review[/URL] of the new ZonaAlarm virtualized security environment that is ForceField, Roger Grimes praises the elegant user interface. While admitting to being a big fan of Check Point and the ZoneAlarm brand, Grimes remains skeptical of these kind of virtualization products and it would appear with good … | |
According to the UK government, new proposals within the [URL="http://www.commonsleader.gov.uk/output/page2461.asp"]Communications Data Bill[/URL] are being put forward in order to prevent and detect crime as well as protect national security. The government argues that unless legislation is amended to reflect changes in technology, the ability of public authorities to counter criminal … | |
You really could not make this up, despite the fact that the computer bugs in question are called 'crazy rasberry ants' and reported quotes from victims range from the ridiculous [URL="http://www.timesonline.co.uk/tol/news/world/us_and_americas/article3941545.ece"]"If you’ve seen a car racing, that’s how they are. They’re going fast, fast, fast. They’re crazy"[/URL] to the sublimely … | |
Spam is annoying, resource consuming, malware driven and often offensive. It is also nothing if not responsive to market needs. This can be seen in the market driven swing from pharmaceutical and health related spam which has pretty much dominated the landscape during the last couple of years, to the … | |
Have you ever wondered exactly how a botnet works? A wotnet, you ask? A botnet, I say. You know, the thing that your computer might well be a part of, without your knowledge or approval, which is used to launch distributed denial of service attacks, send spam, distribute malware and … | |
According to security experts [URL="http://www.sophos.com"]Sophos[/URL] a man has been arrested after allegedly trying to sell a hard drive which had previously belonged to Formula One racing driver Adrian Sutil and contained personal and financial data. The police in Germany are said to be questioning the man regarding a blackmail attempt … | |
News is breaking that [URL="http://www.dailytech.com/article.aspx?newsid=11735"]Microsoft is preparing a 65nm GPU[/URL] for the next Xbox 360, codename Jasper and due in August. The most recent updates to the ever popular games console, namely the Falcon revision, seem to have helped a lot with RRoD failure: also known as Red Ring of … | |
A report entitled "[URL="http://ece.uprm.edu/~andre/insert/gmail.html"]Exploiting the Trust Hierarchy among Email Servers[/URL]" published by Pablo Ximenes from the University of PR at Mayaguez, USA and Andre dos Santos at the State University of Ceara, Brazil suggests that Google Mail is flawed in such a way so as to turn it into massive … | |
It has emerged that Belgium is the latest country to feel the force of the Chinese cyber-super-power, with [URL="http://english.ohmynews.com/articleview/article_view.asp?at_code=434212"]Belgian ministers claiming[/URL] that state sponsored hackers have been targeting Federal Government computers. The Justice Minister in Belgium, Jo Vandeurzen, has claimed that the spate of hacking attacks also reported to parliament … | |
Microsoft has launched a new add-in, designed specifically to simplify the process of creating content that is accessible for visually impaired and what it refers to as 'print disabled' individuals. The new [URL="http://www.openxmlcommunity.org/daisy"]Save as DAISY XML[/URL] add-in is open source, being developed in conjunction with the [URL="http://www.daisy.org"]Digital Accessible Information System … | |
Rather aptly located in the heart of Silicon Valley, the [URL="http://www.computerhistory.org"]Computer History Museum[/URL] will open its doors to the Charles Babbage Difference Engine Number 2 on May 10th. One of only two such working devices in existence, the first being housed within the Science Museum in London, the Babbage Engine … | |
Threat statistics just released by managed security company [URL="http://www.network-box.com"]Network Box[/URL] reveals that phishing attacks now account for 67 percent of all malware by volume. This compares with just 24 percent in February and 48 percent in March, suggesting that the phishers are continuing to be successful where other distribution and … | |
File under very strange but oh so true: Google has launched a bunch of new themes for the iGoogle personalised homepage by artists as diverse as Rolf Harris and Ronnie Wood. These iGoogle skins can be used freely to decorate and personalise your iGoogle homepage, apparently. I am not sure … | |
Security vendor PC Tools [URL="http://blog.threatexpert.com/2008/04/kraken-changes-tactics.html"]has published[/URL] the source code and mathematical algorithm used in the domain name generation technique applied by the latest Kraken bot variant, Bobax. Analysis by researchers at PC Tools has uncovered how Bobax talks to control centres via HTTP using pseudo-random DNS names with a variable … | |
Speaking at the [URL="http://www.westminsterforumprojects.co.uk/eforum/default.aspx"]Westminster eForum[/URL] on Web 2.0 in London, the VP of legislative affairs with AT&T, Jim Cicconi, has claimed that without investment the Internet's current network architecture will be at full capacity by 2010. That's just 24 short months from now, and with the ever increasing volume of … | |
Can it really be 4 years back that Microsoft produced that always destined to fail product the datacasting SPOT watch? Yep, apparently it can, and apparently it has finally been killed off once and for all. Heck, how could it have succeeded? Cast your mind back to 2004 and think … | |
There has been plenty of speculation regarding the what and when of the next generation iPhone from Apple, with some claiming to have laid hands on the device already and others citing new features a-plenty. So far the most reliable reports would appear to have come from the direction of … | |
Mark Furber, MD of a UK strategic online marketing company called [URL="http://www.netcallidus.com"]NetCallidus[/URL], is warning anyone who might be listening that the publicly funded [URL="http://en.wikipedia.org/wiki/Quaero"]QUAERO European search engine research project [/URL]is doomed to failure. Expensive failure at that: Furber says that the project, hyped as at the Euro equivalent of Google … | |
Jim Gamble, the chief executive of the [URL="http://www.ceop.gov.uk/"]Child Exploitation and Online Protection (CEOP) Centre[/URL] has warned paedophiles who use the Internet that they will be tracked down and brought before the courts. The warning comes as CEOP figures reveal that the number of suspects arrested during the last year has … | |
How stupid do you have to be to get caught by spam email with the subject line of 'we caught you naked [your name] - check the video' is a question I have been asking myself today. Not because I have been caught naked, and if I had my only … | |
Research by security as a service specialists [URL="http://www.scansafe.com"]ScanSafe[/URL] has proven something that pretty much everyone knew already: namely that people working at home are more likely to view online pornography than those stuck in an office somewhere. I mean, it hardly needed a survey to dig up that little gem, … | |
[URL="http://www.itpro.co.uk/news/187851/apple-iphone-vulnerable-through-safari.html"]According to IT Pro[/URL] the Apple iPhone is vulnerable to Denial of Service attacks. These can occur when an iPhone user opens a JavaScript containing HTML page which triggers the vulnerability. An application Denial of Service attack can then crash the Safari browser on the phone, and quite possibly the … | |
Rather surprisingly, Kaspersky Lab has forecast that the security threat landscape will increase by more than 20 million programs by the end of 2008 when compared to the 2007 year-end figures, a ten-fold increase no less. That is worth repeating: the number of [B]new[/B] malicious applications in circulation by the … | |
According to [URL="http://www.itpro.co.uk/news/186540/the-security-business-has-no-future-says-ibm.html"]reports[/URL] the general manager of Internet security with IBM has warned that "the security business has no future." Speaking at the RSA conference in San Francisco, IT Pro says, Val Rahmani warned that the enterprise must fundamentally change security strategies if it is to have any success within … | |
[URL="http://news.yahoo.com/s/pcworld/20080408/tc_pcworld/144243"]News is breaking[/URL] that the European Commission could push for laws to restrict the personal search data held by search companies to no longer than six months, after which it must be discarded. The EC Article 29 data Protection Working Party seems to be heading for a confrontation with search … | |
There are lies, damned lies and statistics. Or something like that. However, there are also some really interesting figures emerging about online life right now which are worthy of repeating here. How about [URL="http://community.zdnet.co.uk/blog/0,1000000567,10007735o-2000537720b,00.htm"]this report[/URL] that the numbers of web sites on the Internet has risen from, can you believe … | |
It should come as no surprise that the upcoming 'Patch Tuesday' from Microsoft should include critical patches covering the likes of VBScript and Jscript implementation in Windows 2000, XP and 2003. However, [URL="http://www.itpro.co.uk/news/184764/not-even-vista-sp1-escapes-next-patch-tuesday.html"]some reporters[/URL] have expressed just a little astonishment that both Windows Server 2008 and Vista SP1 are also … | |
[URL="http://www.fortiguardcenter.com"]According to unified threat management specialist Fortinet[/URL] Facebook users had better start paying attention to the postings that appear on their message wall within the popular social networking site. It appears that spammers are moving away from targeting third party applications, as evidenced in the recent 'Secret Crush' case, and … | |
Security provider Webroot has today published its [URL="http://www.webroot.com/En_GB/land-sois-home.html"]State of Internet Security: Protecting Business Email[/URL] research report and estimates that every single business email account will receive some 42,000 spams during the course of 2008. Or 116 junk messages every single day if you prefer. That is an increase of some … | |
I am not an easily shockable person. Anyone who knows me, anyone who has seen me, will understand this. Indeed, other than the usual trio of sexual or racial abuse and mindless violence it takes a lot to drop my jaw in shame and despair while browsing the web. However, … |
The End.