Someone call the malware antitrust commission: Recent versions of the Kovter ad fraud Trojan, which infects computers through Web-based exploits, close the door after themselves by updating Flash Player to the latest version.
By Lucian Constantin | 04 July, 2015 01:32
Cisco Systems recently realized that its Unified Communications Domain Manager (Unified CDM) software contains a default privileged account with a static password that cannot be changed, exposing the platform to hacking by remote attackers.
By Lucian Constantin | 03 July, 2015 21:13
More than 25 per cent of malware distributed in Australia during May was Android ransomware, a rise from February when Android ransomware levels were at six per cent, according to Bitdefender research.
By Hamish Barwick | 03 July, 2015 11:36
Video streaming service Plex has reset user passwords after it was breached by a hacker who threatened to release stolen data unless he's paid a ransom.
By Jeremy Kirk | 03 July, 2015 10:29
Servers could be haunted by a ghost from the 1980s, as hackers have started abusing an obsolete routing protocol to launch distributed denial-of-service attacks.
By Lucian Constantin | 02 July, 2015 23:35
Line up for IPv4 addresses... HP makes PC/enterprise split official... PayPal to buy money transfer service Xoom... and more tech news
By IDG News Service staff | 02 July, 2015 21:52
After China lifted its ban on video game consoles, both Microsoft and Sony moved fast to launch their products in the country. But at least for this year, the sales will be lackluster, according to a research firm.
By Michael Kan | 02 July, 2015 14:18
Seventy nine per cent of Australians support monitoring of social media to detect terrorist activity but draw the line at companies using Twitter, Facebook or LinkedIn to make targeted advertising offers according to a new survey.
By Hamish Barwick | 02 July, 2015 11:28
A Drug Enforcement Administration agent intimately involved in the Silk Road investigation admitted on Wednesday he secretly accepted bitcoins from the underground website's operator and illegally took other funds.
By Jeremy Kirk | 02 July, 2015 09:34
It's become common practice to use virtual private networks for extra privacy and security in this era of mass surveillance, but a study published this week suggests such networks may not be as safe as they're commonly made out to be.
By Katherine Noyes | 02 July, 2015 06:40
A hacker group known as Team GhostShell is publishing snippets of sensitive data allegedly stolen from the databases of hundreds of compromised websites.
By Lucian Constantin | 02 July, 2015 02:19
Apple released patches for several exploits that could allow maliciously crafted applications to destroy apps that already exist on devices, access their data or hijack their traffic, but a large number of iOS devices are still vulnerable.
By Lucian Constantin | 02 July, 2015 00:14
By Peter Sayer and Loek Essers | 01 July, 2015 23:52
Court says NSA can keep collecting phone records... Vandals cut cables again... Leap second largely trouble-free... and more tech news
By IDG News Service staff | 01 July, 2015 21:55
China has adopted a new security law that gives the government control over its Internet infrastructure, along with any critical data.
By Michael Kan | 01 July, 2015 19:07
Worldwide data storage hardware sales saw a boon in the first quarter of this year, with a 41.4% leap over the same quarter in 2014.
By Lucas Mearian | 01 July, 2015 10:49
A U.S. surveillance court has extended a controversial telephone records dragnet while the National Security Agency works to wind down the program on orders from Congress.
By Grant Gross | 01 July, 2015 05:25
Recent concerns from tech luminaries about a robot apocalypse may be overblown, but artificial intelligence researchers need to start thinking about security measures as they build ever more intelligent machines, according to a group of AI experts.
By Grant Gross | 01 July, 2015 03:54
Potentially saving the world from another online security disaster like last year's Heartbleed, Amazon Web Services has released as open source a cryptographic module for securing sensitive data passing over the Internet.
By Joab Jackson | 01 July, 2015 03:03
European Union citizens will have to wait another couple of years before they are able to use their mobile phones anywhere within the EU without surcharge, after a compromise reached by lawmakers Monday night.
By Peter Sayer and Loek Essers | 01 July, 2015 02:20
This report showcases the results from a Computerworld survey across IT managers and CIOs on their organisation’s use and intentions around data backup and recovery processes. Find out: how IT leaders are changing the way they protect their organisation’s valuable information, the most popular uses and intentions around data backup practices and how organisations are dealing with exponential data growth.
In the past, application delivery was something that stood in the way of business objectives. It slowed down key initiatives and delayed time-to-market for innovative services. Read the Forrester report that describes the keys to effective application delivery in the modern age. You will learn: how to deliver innovative software at a pace that was inconceivable just a few years ago, how to master a fluid approach to design and development across functions and organisations, how to open up a performance advantage over dev shops that don’t embrace these methods.
- Uber throws in the towel in battle with French taxi drivers
- As Windows 7 breaks the 1B-device mark, Microsoft's challenge will be to force it back to zero
- Android phone vendors should improve update policies, consumer organization says
- Five smartphones to look forward to
- Ad fraud Trojan updates Flash Player so that other malware can't get in
- The Upload: Your tech news briefing for Friday, July 3
- Cisco leaves key to all its Unified CDM systems under doormat
- IT firms' cloud appetite strong as gear sales surge 25 percent
- Samsung faces lawsuit in China over bloatware on phones
- Reddit sections go dark after exit of staffer
- Android ransomware on the rise in Australia
- Microsoft buries hatchet with Kyocera, ending litigation
- Plex hacker demands Bitcoin ransom for return of data
- Hands-on: Windows 10's latest build feels close to finished
- In Pictures: 7 things we hate about Twitter