1,082 News Story Topics
Remove Filter The results from what is claimed to be the most comprehensive global online job trends survey, the 'Fast 50' Q2 2012 report took data from 190,000 online job postings as an indicator of the global online employment economy. Some of the findings are surprising to say the least, such as … | |
[ATTACH=RIGHT]22544[/ATTACH]Three and a half years ago, DaniWeb was reporting how [URL="http://www.daniweb.com/hardware-and-software/networking/news/218954"]stolen credit cards could be purchased online[/URL] for as little as $10 per card, complete with a guarantee that the accounts behind the cards were active, when purchased in larger volumes. So how has the market changed since the start … | |
[URL="http://www.yandex.ru/"]Yandex[/URL] is one of the leading Internet portals in Russia, and yes they do still use that terminology instead of search engine. The name itself, apparently, stands for Yet Another Indexer which is kind of apt as the company has just published the results of Yet Another iPad Survey. However, … | |
The head of the UK MI5 intelligence agency, Jonathan Evans, has this week warned that the [London 2012 Olympic Games](http://www.london2012.com/) "present an attractive target for our enemies and they will be at the centre of the world's attention in a month or so". But most of the concern, and indeed … | |
As a three times winner of the IT Security Journalist of the Year award in the UK, I am used to writing about all kinds of scams. Whilst most of them try and weasel their way into the bank accounts of the victim through purely online means, increasingly the bad … | |
How do consumers engage with marketers today and what does the future hold? Those were the questions posed by the Greenlight [Search and Social Survey](http://gossip.greenlightdigital.com/magazine/the-search-and-social-media-survey-edition-2012/ ). The answers might come as something of a surprise to those who had all but written off Google+ or think that Facebook couldn't be … | |
Acronis responds to DaniWeb questions regarding a leak of customer data which, [as we exclusively reported over the weekend](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/427455/breaking-acronis-blames-technical-issue-for-customer-data-leak), resulted in some information being indexed by search engines and accessible to anyone on the Internet.  Although the leak itself was identified by Acronis on Friday 29th June, the … | |
Following on from the news earlier this month that [LinkedIn had suffered a major security breach](http://www.daniweb.com/internet-marketing/social-media-and-web-communities/news/425019/linkedin-confirms-six-million-password-hack-check-if-yours-is-one-of-them) involving the compromise of at least six million user passwords, and then dating site [eHarmony apparently falling victim to the same password hacking compromise](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/425118/dating-disaster-eharmony-confirms-passwords-exposed-by-linkedin-hacker), the latest to be hit would appear to be the … | |
Recently we have all become somewhat over-exposed to the leaking of customer data courtesy of inadequate security allowing hackers to gain access to databases. The [LinkedIn LeakedOut leak](http://www.daniweb.com/internet-marketing/social-media-and-communities/news/425019/linkedin-confirms-six-million-password-hack-check-if-yours-is-one-of-them) and [eHarmony dating data disaster](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/425118/dating-disaster-eharmony-confirms-passwords-exposed-by-linkedin-hacker#post1817377) are good examples of the genre. However, let's not forget that sometimes no hackers are required to … | |
The United Nations Global Pulse, along with analytics software specialist SAS, has revealed how social media streams can be used as predictors of national unemployment line spikes. By analysing more than half a million blogs, forums and news sites, the researchers were able to determine how social media chatter more … | |
At least 55,000 Twitter accounts would appear to have been compromised in a breach perpetrated by members of the Anonymous hacking collective. Details of the accounts, including usernames and passwords, appeared across a total of no less than five pages at Pastebin yesterday.  However, appearances can often be … | |
Thought the days of having to use a particualr web browser client in order to use a specific site were over? Think again if this conversation between a user and eBay support is anything to go by.  As a journalist who has spent the largest part of the … | |
A password is defined as being a "secret word or string of characters" that is used to authenticate identity and enable access to a resource. The emphasise being on the word secret, although 'unique' is equally important when it comes to password security. Which is why the list of the … | |
Today is [World IPv6 Launch Day](http://www.worldipv6launch.org ).Today is the day that the global Internet gets redefined. Today is the day that people everywhere are saying "so what?" I imagine. However, not everyone is having a 'meh!' moment at the thought of IPv6 being officially launched. Take Jay Parikh, Vice President … ![]() | |
A cyber weapon grade piece of malware, some twenty times the size of Stuxnet, has apparently been fired at a number of countries in the Middle East. This highly complex piece of code which takes screenshots of any open 'programs of interest' such as email or IM, records audio and … | |
I have always thought of Google as being a search engine for everyone, that's part of the appeal. So when the development team behind a web portal for 'mature users' contacted me about the launch of a new search engine specifically designed for the older user I was a little … | |
The Serious Organised Crime Agency (SOCA) website remains offline after being hit by a Distributed Denial of Service (DDoS) attack for the second time in the space of a year. Last June it was the hacktivist group LulzSec which claimed responsibility; this time nobody has yet come forward to admit … | |
The Flashback Trojan has infected at least 600,000 Apple computers running Mac OS X according to the Russian AV company [Dr Web](http://www.drweb.com/?lng=en) which researched the spread of the malware which was originally discovered at the end of last year and for which Apple issued a security patch just this week. … | |
Apple had a great opportunity to build bridges, not only between itself and its customers but also with Adobe, by announcing it had finally done the right thing and included support for Adobe Flash when it [URL="http://www.daniweb.com/news/story273336.html"]announced new iPhone 4.0 OS features[/URL] this week. Perhaps unsurprisingly, Apple did not grasp … | |
If you are a user of Adobe Flash, be sure to apply the latest security update if you want to avoid becoming part of an in-the-wild attack exploiting a vulnerability which currently seems to be exploiting users of Internet Explorer on the Windows platform only. Adobe has, however, issued an … | |
[ATTACH=RIGHT]22416[/ATTACH]A group of social media experts meeting at Microsoft's London offices has warned that social media is more than just a numbers game and for marketing campaigns to succeed, business must understand how a blend of creativity and science drives it. The round robin event featuring social media experts from … | |
Forget the Windows 7 launch, the real big news from Microsoft this week is that it has reached a deal with Twitter to include real-time tweet data in Bing searches. If that wasn't excitement enough for the Twitterati, just a few hours after Microsoft made its announcement Google joined in … | |
Although you may not realise it, dear coder, you apparently have the best job in America. At least that's what the newly published [2012 Jobs Rated Report](http://www.careercast.com/jobs-rated) reckons. The CareerCast research shows that for the second year running the best job in the US is a software engineer. Not surprisingly … | |
The Apple iWork office productivity suite for the Mac has been around for ages, and was recently joined by an iOS version. iWork documents have, up until now, been seen as being pretty safe courtesy of the particular implementation of the 128-bit AES encryption Apple used to secure them. I … | |
Security researchers are warning that some 30,000 WordPress websites, 85% of them based in the US, have been compromised by a mass-injection hijack attack which sees visitors to any of more than 200,000 individual pages redirected to a Trojan infected rogue AV scam. [ATTACH=RIGHT]24076[/ATTACH]The senior security researcher with Websense Labs, … | |
Probably the most common Olympic Games 2012 scam is that of unofficial ticket sales. No great surprise there, but the fact that Google appears to be in on the act might come as a shock to many. So what, exactly, is going on? [ATTACH=RIGHT]23779[/ATTACH]A little known law in the UK … | |
The Iranian Cyber Army may be the latest elite military hacking squad to hit the headlines, but Iran has a long way to go if it's to catch up with China in terms of international data disruption. According to one newly published report into the threat from Chinese state-sponsored espionage … | |
Following the arrest of 25 suspected members of the Anonymous hacking collective in Europe and South America, the INTERPOL website went offline. Coincidence? I don't think so. After all, Anonymous has already proven it isn't scared, or indeed incapable. of taking down law enforcement sites. Earlier in the month it … | |
The Ainslot.L Trojan appears to be much the same as any other at first glance; logging user activity and sending Gmail and Facebook passwords to the bad guys, downloading further malware, taking over your computer and the main payload of being a Banking Trojan stealing account login data. But Ainslot.L … | |
If you use, or operate, a password-free wireless network then legal action being taken in the US by the adult movie industry might just be about to rain on your parade warns one European IT threat mitigation expert. [ATTACH=RIGHT]23826[/ATTACH]The lawsuit was filed by Liberty Media Holdings, a producer of adult … | |
The biggest heroes and villains in IT history have been revealed as the results of a new poll are published. Perhaps rather surprisingly, Steve Jobs is just as hated as Bill Gates and Facebook founder Mark Zuckerberg is more hated than both of them. But that's just where the shock … | |
[URL="http://en.wikipedia.org/wiki/Man-in-the-middle_attack"]Man-in-the-Middle (MITM) attacks[/URL] are, sadly, not news these days; they are a fact of online life. But word of how the latest SpyEye Trojan-driven MITM attacks are using clever post transaction fraud systems to effectively erase the evidence of the crime from the victims' view certainly deserve to be. Attacking … | |
How will Microsoft differentiate Windows 8 in an already crowded Windows OS user space? How about, for one, with the use of a photographic gesture security system for logging in? The idea of using a photo to identify and authenticate the user is not without some pretty obvious problems (ambient … | |
Sykipot is not a new Trojan Horse by any means, but the variation found to be attacking Department of Defense smart cards is certainly something that government agencies need to be worried about. United States government agencies, that is. It's doubtful the Chinese government will be too worried about them, … ![]() | |
On the evening of 24th February, Google Principal Engineer Matt Cutts promised that a newly [URL="http://googleblog.blogspot.com/2011/02/finding-more-high-quality-sites-in.html"]tweaked search algorithm that impacted on 11.8% of search queries[/URL] (an absolutely massive change to the way that search works, in other words) would "reduce rankings for low-quality sites which are low-value add for users, … | |
I know that Apple has been expending a lot of hot air telling anyone who will listen that the new iTunes pricing regime is a good thing for consumers. I know that it reckons that for every song which is ramped up to the new 99p (here in the UK) … | |
Ask a group of 100 people how they search for images online and the chances are that the vast majority will give the standard 'Google' response. Indeed, Google Images is a useful search engine if you are satisfied with a scattergun approach to finding all images that match a specific … | |
With the recent announcement of an easy way to gain root access for Android phones running 2.3.4, to add to the list of similar exploits for earlier versions and 3.0 and beyond, it should come as no real surprise that the bad guys are taking advantage of the relative weakness … | |
So you want to work on any computer as you owned it, but without going through the whole remote access process? Thanks to an early-stage company established after the founders met whilst studying for PhDs in Computer Science at Cambridge University your wishes might just be about to come true. … | |
[ATTACH=RIGHT]21691[/ATTACH]“Your PC may be infected” says Google, which has taken the unusual step of [URL="http://googleblog.blogspot.com/2011/07/using-data-to-protect-people-from.html"]warning users[/URL] that a couple of million or so of them have most likely been taken in by a fake AV scam. According to a post on the official Google blog by security engineer Damian Menscher, … | |
[URL="https://www.facebook.com/TeaMp0isoN"]TeaMp0isoN[/URL], a black-hat hacking collective, has announced that it is to collaborate with Anonymous on Operation Robin Hood which swears to take money from the banks (in the form of stolen credit card data) and redistribute the wealth from the 1% to the 99% in support of the Occupy Movement. … | |
[ATTACH=RIGHT]22851[/ATTACH]Thought Apple had the tablet market sewn up? Think again. And it's not Android but apathy that's the problem according to new research. Yep, if you thought Apple had the whole tablet computing market sewn up tighter than a zombies' mouth, you would be wrong according to newly published research … | |
[ATTACH=RIGHT]22459[/ATTACH]Just how desperately are you looking for love? Unfortunately, for some the answer is all too often all too desperately; to the point where common sense leaps out of the window and is quickly followed by the bank balance. According to new research by the University of Leicester in the … | |
It may win the prize for being the research with the most surreal title, but the 'My dog ate my iPad' report comes with a very serious message attached and one that business would do well to listen to. The full title of the independent research report, commissioned by SecureData, … | |
Using newly registered domains with a very short lifespan to host malware websites is so last year. It would appear that these days such things are far more likely to be hosted on much older compromised web sites instead. Could this be down to a decline in domain tasting? The … | |
[ATTACH=RIGHT]21935[/ATTACH]While it is always easy for 'the media' to blame technology for whatever bad stuff is currently filling the front pages of the newspapers, could it actually have a point as rioting and looting rip apart the streets of London? The answer might appear to be a tentative yes as … | |
[ATTACH=RIGHT]22271[/ATTACH]It's official: Android now has a greater market share than iPhone across the EU5 countries of France, Germany, Italy, Spain and the UK. According to newly published data from the [URL="http://www.comscore.com/Products_Services/Product_Index/MobiLens"]comScore MobiLens service[/URL], nearly one in four smartphone users in the EU5 region were using smartphones running on a Google … ![]() | |
Anyone who uses Twitter, and has at some point posted a link to something interesting, will have almost certainly used a URL-shortening service such as bit.ly for example. Now the spammers are exploiting the popularity of such link-reduction services by establishing their own fake URL-shortening services in order to redirect … | |
Apple has been holding a highly unusual press conference to clam fears about the iPhone 4 and the 'death grip' problems some users have experienced. Unfortunately, Steve Jobs seems to be in two minds about what message to get across. On the one hand he says there is no problem, … | |
What do you, dear reader, call a posting on Twitter? I'm guessing the chances are high that you call it a tweet, like pretty much everyone else I know. Apart from the editorial elite at the New York Times that is, which has just banned the word 'tweet' from being … |
The End.