online safety - News, Features, and Slideshows
The critical Shellshock vulnerabilities found last month in the Bash Unix shell have motivated security researchers to search for similar flaws in old, but widely used, command-line utilities.
By Lucian Constantin | 31 October, 2014 06:15
Users of Drupal, one of the most popular content management systems, should consider their sites compromised if they didn't immediately apply a security patch released on Oct. 15.
By Lucian Constantin | 31 October, 2014 01:50
Facebook and Yahoo have developed a mechanism to prevent the owners of recycled email addresses from hijacking accounts that were registered on other sites using those addresses in the past.
By Lucian Constantin | 24 October, 2014 06:04
Many companies set up subdomains for use with external services, but then forget to disable them when they stop using those services, creating a loophole for attackers to exploit.
By Lucian Constantin | 24 October, 2014 00:57
Malicious advertisements made their way last week to almost two dozen popular websites and used browser-based exploits to infect computers with CryptoWall, a nasty file-encrypting ransomware program.
By Lucian Constantin | 23 October, 2014 04:40
Google is letting users protect their accounts against password compromises by adding support for two-factor authentication based on physical USB keys.
By Lucian Constantin | 22 October, 2014 06:40
If you haven't updated your Flash Player with the fixes released on Oct. 14, you may be vulnerable to new attacks using a commercial exploit kit called Fiesta, security researchers warn.
By Lucian Constantin | 22 October, 2014 01:39
Users who are careful to download files only from trusted websites may be tricked by a new type of Web vulnerability: this one cons them into downloading malicious executable files that are not actually hosted where they appear to be.
By Lucian Constantin | 18 October, 2014 03:12
Hackers claim to have stolen a database of almost 7 million Dropbox log-in credentials, but the company says its service was not hacked and that unrelated websites are the data source.
By Lucian Constantin | 15 October, 2014 02:07
Many security experts feel that passwords are no longer sufficient to keep online accounts safe from hackers, but we're still a long way from widespread adoption of biometrics and alternative methods of authentication.
By Lucian Constantin | 14 October, 2014 07:29
More and more websites are looking to enable SSL encryption to protect their visitors from eavesdroppers and hackers. Now web infrastructure company CloudFlare will make it a bit easier by adding that feature to the free version of its hosting service.
By Mikael Ricknäs | 30 September, 2014 00:34
Google, Dropbox and the Open Technology Fund are supporting a new organization focused on making open-source security and privacy tools more user-friendly.
By Lucian Constantin | 20 September, 2014 03:32
Nine months after revealing plans to develop a decentralized and encrypted chat application, BitTorrent has opened public testing for Windows, Mac and Android versions of the program Wednesday.
By Lucian Constantin | 19 September, 2014 00:17
Twitter's recently announced bug bounty program has helped the company identify and patch a serious vulnerability that could have potentially disrupted advertising on its platform.
By Lucian Constantin | 18 September, 2014 01:07
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
- FTDigital Marketing CoordinatorNSW
- FTDigital Performance Manager - MediaNSW
- FTAccount Manager - DataNSW
- FTSenior SEO ManagerNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTClient Service Director - Search: SEO & PPCNSW
- FTStudio Design ManagerVIC
- FTChief Information Officer - CSIROACT
The most basic network attacks attempt to overwhelm a defensive device with sheer volumes of traffic. Sometimes these volumetric attacks are designed to overload the connections-per-second (CPS) capacity (e.g., the ramp-up rate). Learn how to mitigate DDoS attacks
- North Korea reportedly blocks Facebook and Twitter
- FCC eyes new rules to protect consumers as voice networks transition to IP
- Startup Slack gets $120M infusion to kill email at work
- Oracle's Larry Ellison isn't done building his legacy
- Microsoft Releases NEW Office for the Mac (Oct/2014)
- Microsoft teases Office for Mac with Outlook-only release
- Ericsson's WebRTC browser available for download from the App Store
- HP to jolt 3D printer market
- Starbucks says 1 in 6 payments already mobile
- HP's radical new Machine could start computing by 2016
- Apologetic Microsoft unleashes Xim globally for Android, Win Phone
- FCC: A range of net neutrality options remain on the table
- iOS 8 app crash rate falls 25% since release
- Pirate Bay co-founder sentenced to 3.5 years imprisonment in Denmark
- Google to kill off SSL 3.0 in Chrome 40