online safety - News, Features, and Slideshows
Six people have been indicted on charges of running an international ring that resold tickets bought through compromised StubHub accounts for some of New York's biggest concerts and sporting events.
By Martyn Williams | 24 July, 2014 05:34
Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.
By Lucian Constantin | 23 July, 2014 01:06
Advocacy group the Electronic Frontier Foundation wants to address the poor security track record of home routers with a new firmware project that will encourage users to share their Internet connection publicly by setting up guest Wi-Fi networks.
By Lucian Constantin | 22 July, 2014 03:58
Researchers are gearing up to hack an array of different home routers during a contest next month at the Defcon 22 security conference.
By Lucian Constantin | 19 July, 2014 02:07
A new Trojan program designed to steal log-in credentials and other financial information from online banking websites is being advertised to cybercriminal groups on the underground market.
By Lucian Constantin | 15 July, 2014 04:33
Oracle has dispelled rumors that the upcoming security update for Java 7 and those it will release in the future might not work on Windows XP.
By Lucian Constantin | 14 July, 2014 23:09
Microsoft updated the Certificate Trust List in Windows to revoke trust for a certificate authority operated by the Indian government after it improperly issued at least 45 SSL certificates for domains owned by Google and Yahoo.
By Lucian Constantin | 12 July, 2014 03:04
Cybercriminals are trying to create a new botnet based on what is likely a modification of Gameover Zeus, a sophisticated Trojan program whose command-and-control infrastructure was taken over by law enforcement agencies at the beginning of June.
By Lucian Constantin | 12 July, 2014 00:56
The scope of a recent security breach at a digital certificate authority (CA) controlled by the Indian government is bigger than initially thought and also targeted domain names owned by Yahoo, in addition to several owned by Google.
By Lucian Constantin | 11 July, 2014 01:22
Implementation issues with AVG Secure Search, a browser toolbar from antivirus vendor AVG Technologies that's supposed to protect users from malicious websites, could have allowed remote attackers to execute malicious code on computers.
By Lucian Constantin | 09 July, 2014 01:22
Attackers injected malicious code into Dailymotion.com, a popular video sharing website, and redirected visitors to Web-based exploits that installed malware.
By Lucian Constantin | 05 July, 2014 00:00
Two SQL injection vulnerabilities were patched in Ruby on Rails, a popular open-source Web development framework used by some high-profile websites.
By Lucian Constantin | 04 July, 2014 22:04
PayPal was one of the first large online services providers to offer two-factor authentication to its users, but until recently the company's implementation had a loophole that could have allowed attackers to bypass this additional protection.
By Lucian Constantin | 26 June, 2014 03:01
The number of NTP (Network Time Protocol) servers that can be abused to amplify DDoS attacks has decreased dramatically this year, but the threat remains.
By Lucian Constantin | 25 June, 2014 23:46
Despite a great start, the rate of patching OpenSSL servers against the critical Heartbleed vulnerability has slowed down to almost a halt. Around 300,000 servers remain vulnerable and many of them are unlikely to get patched anytime soon.
By Lucian Constantin | 24 June, 2014 01:46
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
In response to changing customer trends in an increasingly mobile and digital world, the contact centre must also evolve from its traditional focus on voice- and email-based customer service into the intelligent contact centre. This whitepaper details the key qualities needed to produce and maintain an omni-channel, context-aware customer engagement optimization platform.
- Hackers steal user data from the European Central Bank website, ask for money
- Lenovo shows smart glasses prototype as it seeks hardware partners
- Salesforce.com launches Sales Reach for real-time selling and marketing
- LG notches record smartphone shipments on G3 strength
- EBay faces class action suit over data breach
- Turnbull warns ACCC against undermining Telstra NBN agreement
- Sale of Mt. Gox-related Bitcoins.com halted after court order
- Qualcomm faces hurdles collecting royalties from China
- Twitter employees mainly male and white, says it has 'lot of work to do'
- Facebook isn't giving up on search
- Firm says vulnerability in Tails contained in I2P component
- More AT&T customers switch to paying for their phones
- Dropbox lures business users from consumer product
- Ultra high-def TVs still too expensive
- Facebook reports a big sales jump, helped by mobile ads