1,082 News Story Topics
Remove Filter It started as just another early morning at work, arriving at 5.30am outside the converted mill where I rent a small space in amongst the myriad industrial units and office lets. I pulled up outside in my Fiat 500 and removed my backpack that doubles up as my laptop case … ![]() | |
Almost exactly a year ago I was writing about [the development of Google Glass](http://www.daniweb.com/hardware-and-software/pc-hardware/monitors-displays-and-video-cards/news/426788/no-google-glass-for-most-developers-until-2014) here at DaniWeb. In the meantime, the project has turned into a reality and [actual product has got into the hands of reviewers](http://www.pcpro.co.uk/features/380401/before-iwatch-and-google-glass-wearable-computing-milestones-and-failures/2) and some lucky users with $1,500 to spare. This would all be much … ![]() | |
The latest VIPRE Report from [GFI Labs](http://www.gfi.com) suggests that 2013 started off as a bad year for social network-based cybercrime attacks. The report, which analysed the ten most prevalent threats detected during the month of January, identified phishing messages on both Twitter and Facebook as well as malicious spam messages … | |
A new survey of 1000 commuters in London has revealed that, for a surprisingly large number of people, losing Internet access is more stressful than having no heating or water. Some 38% of those asked said that they would most stressed by a lack of Internet access at home, compared … | |
A new survey commissioned by IT solutions specialist GFI Software concludes that, for the vast majority of workers in the small to medium-sized business (SMB) sector at least, the conventional nine-to-five/five day working week is dead; and right there holding the smoking gun is email. The survey, independently conducted and … ![]() | |
Dana Tamir, Enterprise Security Director for [Trusteer](http://www.trusteer.com/) has recently uncovered a variation of the TorRAT banking data malware which has been actively configured to target Twitter users. The attack works by "injecting Javascript code into the victim’s Twitter account page" Tamir says, adding that the malware "collects the user’s authentication … ![]() | |
That dramatic statement pretty much sums up the feelings of many people taking part in a recent survey. They suggest that online banking and online shopping are akin to playing Russian Roulette and it is only a matter of time before their security, credit cards and bank balances are breached. … | |
Research from ecommerce solutions provider SellerDeck (which used to be known as Actinic Desktop) has revealed the top ten ecommerce turn-offs that online retailers need to avoid at all costs if they are to turn clicks into sales.  At the very top of the avoid list comes insecurity. … | |
I blame [URL="http://twitter.com/scobleizer"]Robert Scoble aka scobleizer[/URL] for his 'First look at “revolutionary” social news iPad app: Flipboard' post which led to a flipping iPad app taking over Twitter for most of yesterday. Some 24 hours late, Flipboard has thankfully dropped off the trending top ten list at Twitter, although it's … | |
The UK Information Commissioner's Office (ICO) has slapped the Greater Manchester Police force with a £150,000 fine (reduced to £120,000 for early payment) after a memory stick containing sensitive data about serious crimes was stolen from the home of a police officer.  The ICO has the power to … ![]() | |
Think of apps and you probably think of your smartphone. After all, Apple pretty much built an iPhone empire around the concept of apps and users of Android and Windows handsets are just as hooked. Truth be told though, and this 'Age of Apps' has spread far beyond the smartphone … ![]() | |
New research published today by security vendor ZoneAlarm, the Facebook Child Safety Report, analysed what 600 kids aged between 10 and 15 and located around the world were up to Facebook. The end result reveals those common behaviours that increase the exposure of children to bullying online, predatory threat and … ![]() | |
It has been just over a month now since North Korea gloated about its successful nuclear weapon test. A test which prompted the imposition of new UN sanctions against Pyongyang, and if the Korean Central News Agency (KCNA) which acts as a state mouthpiece for the Democratic People's Republic of … | |
The media, online and off, has been full of scare stories about the 'biggest Internet attack ever' and how a distributed denial of service (DDoS) campaign aimed against anti-spam outfit Spamhaus peaked at an attack volume of 300 Gbps (the highest ever recorded by those who record such things) was … | |
With a billion members, active social circles and more than it's fair share of relative newbies to the world of online security, it should come as no surprise that Facebook continues to be the focus of much attention from those who would do you, your data and your bank balance … ![]() | |
This one nearly escaped my radar, and does not seem to have ruffled many news source feathers either. Which is surprising, because in my never humble opinion it is actually quite an important bit of news. The Virginia Court of Appeals has upheld the conviction of Jeremy Jaynes (the 8th … ![]() | |
Microsoft first started warning people that the there was going to be an important change to Windows' certificate requirements back in June. A change that is designed to improve security across the Windows platform by way of increasing the RSA key length to a minimum of 1024 bits for certificates … ![]() | |
Security researchers reveal ways that willy-waving Chatroulette users might be leaving themselves open to much more than accusations of just being dirty perverts as privacy attack scenarios are explored. [attach]15830[/attach]If you have ever been tempted, like so many male Chatroulette users, to show complete strangers the contents of your trousers … | |
The University of Birmingham in the United Kingdom has been [researching](www.cs.bham.ac.uk/~tpc/Papers/P2PSecComm2012.pdf) how users of the hugely popular file-sharing BitTorrent peer-to-peer protocol are being monitored by those acting for copyright holders. What the researchers found surprised them, and may surprise those using BitTorrent to download pirated content: the average time it … | |
Zurich Insurance in the UK has just discovered the true cost of failing to secure confidential customer data properly, as the Financial Services Authority (FSA) fines the company a record £2.275m ($3.5m) for the data loss incident in 2008 which potentially put some 46,000 customers at risk. [attach]16866[/attach]The incident occurred … ![]() | |
Just as your average Joe starts to 'get' the importance of online security, and that means using anti-virus software, so the bad guys start exploiting this new found understanding by flooding the Internet with fake AV products. [attach]16913[/attach]Security researchers at [URL="http://www.sophos.com"]SophosLabs have today identified a major new fake anti-virus software … ![]() | |
[ATTACH=RIGHT]22213[/ATTACH]You may not be a big fan of Microsoft, but you wouldn't expect your computer to be held to ransom by the company would you? In recent months it has become quite commonplace, at least across Europe, for scammers posing as Microsoft technical support staff to 'cold call' people on … | |
The Internationale Funkausstellung is not a jazz-fusion music event. Nope, the [URL="http:// www.ifa-berlin.com"]IFA[/URL] is apparently the world’s largest consumer electronics show these days, and it runs until 6th September in Berlin. Once over the disappointment that the only music was Muzak-alike piped hell, the race was on to discover the … ![]() | |
Google has announced the availability of more than 1000 ‘Google Gadgets’ that can be run on any web site, differentiating them from the existing desktop gadgets which could only work locally by way of the Google Desktop software or on a personalized Google homepage. These bits of cobbled together HTML … ![]() | |
The line ‘free crypto browser extension for Firefox’ contains six of my favorite words within its seven-word construction, which is not bad going. In case you were wondering, for is the word that doesn’t float my boat, although others such as complexity, ‘key management’ and PGP which usually rub me … ![]() | |
This is, I would suggest, perhaps the biggest privacy issue of the day. I have lost count of the number of press releases, leads, emails and telephone calls that have come my way this year regarding how search engines treat the data you enter when performing a search. Be it … ![]() | |
McAfee publish a list of the top 10 spam subject lines, because of the work done by their threat research and filtering labs as well as customer feedback, and the latest for July shows how the spammer is now concentrating more on ID theft and less on helping you achieve … ![]() | |
According to new research from Randstad Technologies, a specialist recruitment company, less than half of those working in the IT and technology industry in the United Kingdom are happy with their levels of pay. By contrast, however, 60% appear to be quite happy with their jobs despite of this. Interestingly, … ![]() | |
An incredible 69% of IT Administrators are so stressed at work that they have seriously considered changing career as a result, according to a new survey from GFI Software. The 'IT Admin Stress Survey' also revealed that 34% of IT Administrators will work overtime equivalent to an additional 12 weeks … | |
[ATTACH=RIGHT]22083[/ATTACH]In an unusual take on the usual 'my smartphone is better than your smartphone' debate, a new survey has revealed that when it comes to the amount of time we spend using our handset of choice, iPhone users are the biggest addicts. So addicted, in fact, that many iPhone users … | |
Apple hacking PWN2OWN supremo and security researcher Charlie Miller is preparing to reveal just how to hack an Apple MacBook battery. Yep, you read that right: Apple battery hacking could be coming to a MacBook near you soon. Well, near you if you happen to be in Las Vegas for … ![]() | |
On the same day that [URL="http://www.bbc.co.uk/news/business-11225197"]UK Business Secretary, Vince Cable, has been explaining that Government sees "no justification for taxpayers' money being used to support research which is neither commercially useful nor theoretically outstanding"[/URL] and that universities will be expected to "do more for less" an event has been showcasing … ![]() | |
With no actual Halloween-based security threats to report, it looks like the security vendors have had no choice but to start reporting scary stuff that might happen to your data instead. While I have no qualms about genuine warnings to 'be careful out there' this Halloween, a little reminder about … ![]() | |
At just half a cubic inch in volume, 1.62 inches long, weighing half an ounce and coming complete with a built-in clip and little else to spoil the minimalist aluminum design, the smallest digital music player on the planet goes on sale this coming Friday. The surprising thing about this … | |
All right stop, collaborate, and listen. A new variant of the ZeuS financial malware platform known as Ice. This baby Trojan spawned from the original Ice IX is targeting bank customers on both sides of the pond. Here in the UK the 'big three' telecommunications providers are where it is … ![]() | |
Microsoft has published an [advance notification](http://technet.microsoft.com/en-us/security/bulletin/ms13-jan) for vulnerabilities that will be patched in the January 2013 'Patch Tuesday' security bulletin due next week. However, anyone hoping for a permanent fix to deal with the Internet Explorer zero-day exploit that surfaced during the seasonal holiday period is going to be disappointed. … ![]() | |
Why has it taken six years for someone to take a contract out on my life? Or, more accurately, for a scammer to send me an email demanding payment of a bribe in order for him to cancel a supposed contract. The first hitman scam was spotted almost exactly six … | |
A recent survey, conducted by IT risk management specialists nCircle, suggests that as many as 50% of IT security professionals think that the organisations they work for are a potential target for state-sponsored hackers. A number that Tim Keanini, nCircle Chief Research officer, thinks is rather on the low side … ![]() | |
Think of spam and chances are your mind immediately turns to China or Russia and messages about sexual dysfunction or a financial deal you cannot believe. Maybe, though, your thoughts should be closer to home. Especially if home is in the United States. [ATTACH=RIGHT]22797[/ATTACH]According to the latest research from security … ![]() | |
At the risk of being somewhat obsessed by hitmen after [one recent news story](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/441025/dont-be-fooled-by-the-fake-hitman-scam) here at DaniWeb, I'm running another. This time though, it's cybercriminals and hackers who would hold your computer and data to ransom that are the target of a contract killer. The killer in question being the … ![]() | |
It's never easy calculating the true cost of inadequate security to business, not least as there are so many variables and such reticence when it comes to full disclosure for fear of brand damage. However, the latest [Information Security Breaches Survey](http://www.pwc.co.uk/audit-assurance/publications/uk-information-security-breaches-survey-results-2012.jhtml) (ISBS) from PwC/Infosecurity Europe has had a good bash … ![]() | |
You might not have heard about Dirt Jumper yet, but the bad guys have. In fact, the high-risk and highly-effective DDoS toolkit is probably the most aggressive of the malware tools being employed by DDoS attackers at the moment, and the situation is set to get much worse very quickly … ![]() | |
The latest VIPRE report, detailing the ten most prevalent malware threat detections spotted by [GFI Labs](http://malwareprotectioncenter.com/) and the ThreatNet Detection System, reveals that Google, LinkedIn, Skype and Mass Effect 3 were amongst the big brands being exploited by cybercriminals in order to leverage trust whilst distributing malware-laden emails. As a … ![]() | |
Wednesday 6th June 2012 is [URL="http://www.worldipv6day.org/"]World IPv6 Launch Day[/URL] (no, seriously, it is) and, we have been continually reminded in a Chicken Little fashion, the IPv4 address space sky is falling. The fact that the media obsession with Internet addresses running out has been on-going for at least a decade … ![]() | |
China may be odds-on to top the medal table at the London 2012 Olympic Games, with less than a week to go, but according to a new report South Korea has the Chinese well and truly beaten as far as malware infected PCs are concerned. And unlike at the Olympic … ![]() | |
New research shows that hackers are becoming increasingly lazy in their search for online exploits, with 98% of Remote File Inclusion and 88% of SQL injection attacks now being fully automated. It comes as no surprise whatsoever to DaniWeb administrators and moderators that your average cybercriminal is looking for the … ![]() | |
Reports are coming in thick and fast about 'state-sponsored' zero-day exploits hitting business websites in the UK. The latest, disclosed yesterday by [SophosLabs](http://nakedsecurity.sophos.com/2012/06/20/aeronautical-state-sponsored-exploit/), involves an as yet unnamed European aeronautical parts supplier and follows on from another the day before involving a European medical company site. In both cases the … | |
Last week saw the discovery of YAJE: Yet Another Java Exploit. Sadly, Java vulnerabilities are neither new nor uncommon and the bad guys are quick to exploit them in the wild. Some claim that Oracle is in too much of a rush to extricate itself from this unholy mess and … | |
With Twitter now more than 100 million accounts strong, and with 50 million Tweets per day, you might be excused for thinking there's no stopping the micro-blogging network. Until, that is, you start exploring the darkside of Twitter. But is Twitter evil? [attach]16201[/attach]You only have to look at the IT … | |
Whether you travel on business or for pleasure, the chances are pretty high that you will make use of the Internet while abroad. If you are staying at a hotel then, given the high cost of international data roaming on most mobile networks, the chances are that you will make … ![]() |
The End.