Hackers have stolen user contact information, including email addresses and phone numbers, from the website of the European Central Bank and attempted to extort money from the institution.
By Lucian Constantin | 24 July, 2014 22:38
Salesforce.com is combining its Pardot marketing software, sales automation application and social communities platform into a new product called Sales Reach, which it says can help salespeople nurture leads and make deals in real time.
By Chris Kanaracus | 24 July, 2014 22:01
EBay faces a class action suit in a U.S. federal court over a security breach earlier this year.
By John Ribeiro | 24 July, 2014 16:58
A vulnerability broker published a video demonstrating one of several flaws it has found in the privacy-focused Tails operating system, which is used by those seeking to make their Web browser harder to trace.
By Jeremy Kirk | 24 July, 2014 10:30
Six people have been indicted on charges of running an international ring that resold tickets bought through compromised StubHub accounts for some of New York's biggest concerts and sporting events.
By Martyn Williams | 24 July, 2014 05:34
Seagate announced today Roku set-top boxes will now have a channel to connect to Wireless Plus hard drives for streaming movies, music and photos stored on the drives.
By Lucas Mearian | 24 July, 2014 02:34
Dutch intelligence services can receive bulk data that might have been obtained by the U.S. National Security Agency (NSA) through mass data interception programs, even though collecting data that way is illegal for the Dutch services, the Hague District Court ruled Wednesday.
By Loek Essers | 24 July, 2014 01:01
Businesses wanting the security of BlackBerry Enterprise Service 10 without the complexity of managing it onsite can now buy it as a hosted service from six BlackBerry partners.
By Peter Sayer | 24 July, 2014 00:25
A ransomware threat that encrypts files stored on the SD memory cards of Android devices has been updated to target English-speaking users with FBI-themed alerts.
By Lucian Constantin | 23 July, 2014 23:46
A vulnerability in a web-based graphics system led to a breach of The Wall Street Journal's network by a hacker, the newspaper acknowledged late Tuesday.
By Jeremy Kirk | 23 July, 2014 20:34
RSA's annual Asia Pacific & Japan conference kicked off in Singapore on Tuesday. RSA executive chairman Arthur W. Coviello called for an end to cyber warfare while Juniper Network's Kevin Kennedy compared the Information Age to the Golden Age of the Roman empire. The conference concludes today.
By Computerworld Australia staff | 23 July, 2014 17:24
If we are not careful in the decisions or actions that we take online today, the Information Age may go the way of the Roman Empire, according to Juniper Networks senior director of product management Kevin Kennedy.
By Hamish Barwick | 23 July, 2014 15:57
A company that specializes in selling information on software vulnerabilities has reignited a debate over the handling of such information, especially when it pertains to privacy-focused tools.
By Jeremy Kirk | 23 July, 2014 12:27
Cyber weapons will never be completely eliminated but bi-lateral agreements between countries about the use of these weapons could establish boundaries, according to RSA executive chairman Arthur W. Coveillo.
By Hamish Barwick | 23 July, 2014 10:56
Apple has "inadvertently admitted" to creating a "backdoor" in iOS, according to a new post by a forensics scientist, iOS author and former hacker, who this week created a stir when he posted a presentation laying out his case.
By John Cox | 23 July, 2014 08:17
Juniper Networks has divested its mobile security product line, selling the assets to a private equity firm for $250 million.
By Jim Duffy | 23 July, 2014 08:07
The TOR Project thinks it has figured out how the author of a canceled Black Hat talk cracked its software to mask the source of Internet traffic, and it is working on a patch.
By Tim Greene | 23 July, 2014 08:06
Cisco says small cell technology is primed for explosive growth as it plans to connect 3G and LTE cellular networks to Wi-Fi access points that are already widely deployed in many enterprise facilities.
By Matt Hamblen | 23 July, 2014 04:47
Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.
By Lucian Constantin | 23 July, 2014 01:06
Banks across Europe are now coping with a wave of cybercrime in which crooks are transferring funds out of customer accounts through a scam involving bypassing some two-factor authentication systems to steal large sums, according to a security firm assisting in the investigation.
By Ellen Messmer | 23 July, 2014 00:34
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
Pekin Insurance, a large Midwestern insurance policy provider with 1,200 agencies and 7,500 independent agents, is always striving to better serve its customers. Pekin wanted to give its growing number of tech-savvy customers direct online access to policy and billing information. To do that, Pekin launched a new web application, called My PI that would deliver a self-service customer portal.
- Hackers steal user data from the European Central Bank website, ask for money
- Lenovo shows smart glasses prototype as it seeks hardware partners
- Salesforce.com launches Sales Reach for real-time selling and marketing
- LG notches record smartphone shipments on G3 strength
- EBay faces class action suit over data breach
- Turnbull warns ACCC against undermining Telstra NBN agreement
- Sale of Mt. Gox-related Bitcoins.com halted after court order
- Qualcomm faces hurdles collecting royalties from China
- Twitter employees mainly male and white, says it has 'lot of work to do'
- Facebook isn't giving up on search
- Firm says vulnerability in Tails contained in I2P component
- More AT&T customers switch to paying for their phones
- Dropbox lures business users from consumer product
- Ultra high-def TVs still too expensive
- Facebook reports a big sales jump, helped by mobile ads