online safety - News, Features, and Slideshows
Cisco Systems plans to pay $US635 million in cash to buy OpenDNS, a company that leverages the Domain Name System (DNS) to provide security services including Web filtering, threat intelligence and malware and phishing protection.
By Lucian Constantin | 01 July, 2015 01:19
Many commercial software companies and enterprise in-house developers are churning out applications that are insecure by design due to the rapid and often uncontrolled use of open-source components.
By Lucian Constantin | 16 June, 2015 22:00
Adobe Systems fixed 13 security issues in Flash Player that could lead to serious attacks, including remote code execution and information disclosure.
By Lucian Constantin | 10 June, 2015 05:01
A researcher is warning that a gaming plug-in installed on over 200 million PCs contains a flaw that could let attackers steal users' data from websites they're logged into, such as their Web mail and social networking accounts.
By Lucian Constantin | 05 June, 2015 01:03
In yet another testament of the awful state of home router security, a group of security researchers uncovered more than 60 vulnerabilities in 22 router models from different vendors, most of which were distributed by ISPs to customers.
By Lucian Constantin | 02 June, 2015 22:05
Identifying users who access Tor hidden services -- websites that are only accessible inside the Tor anonymity network -- is easier than de-anonymizing users who use Tor to access regular Internet websites.
By Lucian Constantin | 30 May, 2015 02:48
The majority of 3G and 4G USB modems offered by mobile operators to their customers have vulnerabilities in their Web-based management interfaces that could be exploited remotely when users visit compromised websites.
By Lucian Constantin | 29 May, 2015 02:44
By embedding an e-paper display in the back of credit and debit cards, payment specialist Oberthur Technologies hopes to make online fraud a lot more difficult. An upcoming test in France will show if the underlying technology can cut it.
By Mikael Ricknäs | 21 May, 2015 03:50
The latest versions of Safari for Mac OS X and iOS are vulnerable to a URL-spoofing exploit that could allow hackers to launch credible phishing attacks.
By Lucian Constantin | 19 May, 2015 21:51
Tens of thousands of home routers have been infected with malware, and are being used by hackers to launch distributed denial-of-service (DDoS) attacks, including by the hacktivist group Anonymous.
By Lucian Constantin | 12 May, 2015 23:52
In the latest attack involving malicious advertisements, hackers managed to launch Flash Player exploits against the visitors of several popular porn websites.
By Lucian Constantin | 09 May, 2015 00:35
For the past several days security researchers have raced to demonstrate that phishing protections added by a new Google Chrome extension can be bypassed with ease.
By Lucian Constantin | 04 May, 2015 23:04
Microsoft is taking a hard stance against advertisements that trick users into visiting malicious websites or downloading potentially harmful applications.
By Lucian Constantin | 29 April, 2015 23:11
A serious flaw in a component that's used to authenticate clients on Wi-Fi networks could expose Android, Linux, BSD, and possibly Windows and Mac OS X systems to attacks.
By Lucian Constantin | 23 April, 2015 22:07
In the current market, there is an increasing demand for unbiased information about Enterprise Mobility Management (EMM) solutions. This white paper focuses on solutions that are anticipated to have an important role in Enterprise Mobility Management. An overview of features has been created to enable a better understanding and comparison of capabilities.
To accelerate the release of high-quality software apps and updates, you have to accelerate development and testing. That’s hard to do if you’re stuck with a lot of sluggish, error-prone manual processes. How do you move forward? Follow the lead of a head software tester and her team - and get started on the journey to continuous everything: automatically deploy resources as needed in an environment that meets ALL test requirements, support a wide range of applications: web, mobile, and cloud, spend less time troubleshooting the deployment, and more time actually testing.
- Supreme Court justices hold stock in tech vendors, other firms
- There's even an app for dogs and cats scared of fireworks
- Microsoft confirms 'waves' roll-out of Windows 10
- How Instagram spots a trend
- Longtime Microsoft partner Yahoo tests search with Google
- Third build of Windows 10 in one week a sign of OS stability
- GM to offer teen driver tracking to parents
- Scott McNealy sees gold in the hills of social data
- Sprint drops 600 Kbps video-streaming limit after outcry
- Bevy of cheap LTE smartphones on the way, Qualcomm says
- Config error at Boston-area hosting company takes down Reddit, others
- Intel shuffles ranks, President Renée James to exit
- Toyota, Nissan and Honda to back hydrogen fuel cell infrastructure
- Attackers abuse legacy routing protocol to amplify distributed denial-of-service attacks
- The Upload: Your tech news briefing for Thursday, July 2