An individual who did work for Hacking Team was in contact with hackers working for a terrorist organization, and disgruntled employees -- who deny the charge -- were planning to sell an antidote to the spyware vendor's surveillance software, an Italian newspaper reported Friday.
By Philip Willan | 01 August, 2015 04:20
Researchers at the Black Hat 2015 conference next week will show how to crack Internet routing protocols, malware-detecting honeypots, radio-frequency ID gear that gates building access, and more, but also offer tips on how to avoid becoming victims to their new attacks.
By Tim Greene | 01 August, 2015 03:03
The U.S. Federal Trade Commission should reject a privacy group's push to extend the E.U.'s controversial right to be forgotten rules to the U.S. because such regulations would have a "sweeping" negative effect on many U.S. companies, a trade group said.
By Grant Gross | 01 August, 2015 01:54
A hacker extracted customer log-in credentials from a server owned by Bitdefender that hosted the cloud-based management dashboards for its small and medium-size business clients.
By Lucian Constantin | 31 July, 2015 23:40
A security researcher has posted a video on YouTube demonstrating how a device he made can intercept wireless communications to locate, unlock and remotely start GM vehicles that use the OnStar RemoteLink mobile app.
By Lucas Mearian | 31 July, 2015 11:02
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted.
By Lucian Constantin | 31 July, 2015 06:29
Google won't comply with an order from France's privacy watchdog group to apply the right to be forgotten to all its search results around the world.
By Fred O'Connor | 31 July, 2015 04:18
Attackers could exploit a new vulnerability in BIND, the most popular Domain Name System (DNS) server software, to disrupt the Internet for many users.
By Lucian Constantin | 31 July, 2015 03:19
Opponents of a U.S. Senate bill intended to encourage businesses to share information about cyberthreats may have stalled a vote on the legislation.
By Grant Gross | 31 July, 2015 03:14
Smartphone sales increased substantially in the second quarter of 2015, but the rate of growth continued to slow, fueling concerns that the market has started to become saturated, according to a study released today by Juniper Research.
By Jon Gold | 31 July, 2015 03:01
Next-generation endpoint protection vendor SentinelOne has received the same certification that many traditional antivirus platforms seek, meaning it can be considered suitable for meeting certain requirements of industry and governmental regulations.
By Tim Greene | 31 July, 2015 02:14
Obama wants to boost U.S. supercomputing power...OPM, Anthem hackers also hit United Airlines...Oracle preps 'Sonoma' chip for low-priced Sparc servers...and more tech news.
By IDG News Service staff | 30 July, 2015 21:57
These are exciting times to be a gamer in China, according to 19-year-old Dai Qi, a soon-to-be college student.
By Michael Kan | 30 July, 2015 20:55
The cyberespionage group that stole the personal records of millions of Americans from U.S. health insurer Anthem and the U.S. Office of Personnel Management (OPM) has also reportedly breached United Airlines.
By Lucian Constantin | 30 July, 2015 20:14
Offshore outsourcing firms that do most of their work in India remain the largest users of the H-1B visa for computer-related jobs, seemingly unaffected by the odds of the visa lottery, according to new data.
By Patrick Thibodeau, Sharon Machlis | 30 July, 2015 19:57
Email services security vendor Mimecast has begun offering co-located data centre services from two facilities in New South Wales.
By Hamish Barwick | 30 July, 2015 16:17
Millions of Web users could be vulnerable to an attack on their computer's DRAM via the Web, a surprising development that expands on a bug that has increasingly worried computer security experts.
By Jeremy Kirk | 30 July, 2015 11:07
A group has been singled out as the attacker behind the recently disclosed hack against Anthem, believed to be the largest waged against a health care company.
By Fred O'Connor | 30 July, 2015 07:05
The U.S. Congress should take a hands-off approach toward the burgeoning Internet of Things industry and let vendors figure out how to deal with privacy and security issues, representatives of four trade groups said.
By Grant Gross | 30 July, 2015 06:31
A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component.
By Lucian Constantin | 30 July, 2015 00:41
Cloud, big data and analytics, mobile, social, and IT security have impacted networking – bringing it almost to breaking point. This whitepaper looks at the future of networking to accommodate these evolving trends.
This whitepaper looks at the results from the this is the largest study on the specific topic of changing physical and virtual meeting behaviours and the evolving requirements of the collaborative workforce for virtual collaboration and web conferencing. See why nearly 30% of employees report that the number of meetings they have is increasing, with an average of 10 meetings per week, why one-third of all meetings are ad hoc – impromptu or ‘drive-by’ meetings that are neither pre scheduled nor formal in nature and why the use of old tools and structure are ill-suited for the needs of the new agile, collaborative workforce.
- NBN to invest $40m to boost construction workforce
- Windows 10's usage share jumps 4x in three days
- Lawmakers propose new visa for foreign tech entrepreneurs
- Microsoft bests Google in patent case appeal
- Yahoo picks up fashion commerce site Polyvore
- Mt. Gox CEO Karpeles arrested by Japanese police
- Facebook says Flash security woes could hurt its business
- IBM fattens patent portfolio in cloud tech
- Microsoft scores with free Windows 10 upgrade as downloads tally 10x Windows 8's first-day sales
- It's SysAdmin Day: Let us celebrate with coffee
- ISP argues net neutrality rules violate its right to block content
- Former Hacking Team developer reportedly in contact with a terrorist group
- Italian police shutter Dark Web marketplace
- Black Hat 2015: Cracking just about anything
- Android Studio focuses on C++ editing