One well-known gang of hackers contributed to cyberattacks on South Korea on Tuesday, which coincided with the 63rd anniversary of the start of the Korean War, according to analysis from Symantec. The attacks on Tuesday disabled websites, ...
Tags: Cyberattacks, South Korea, Symantec
LinkedIn's domain name was temporarily redirected to a third-party server Thursday, which resulted in a service outage and potentially put user accounts at risk of compromise. Uptime monitoring service Pingdom recorded that LinkedIn was ...
Now that developers have had a few days to delve into the iOS 7 beta, it's becoming clear that the iPhone version of the software could prove beneficial to enterprises. Many members of the 120-person development team at Solstice Mobile in ...
Tags: iOS 7, Enterprises
Distributed denial-of-service (DDoS) attacks that could be related have in the past few days slammed the DNS servers of at least three providers of domain name management and DNS hosting services. DNSimple, easyDNS and TPP Wholesale all ...
Tags: DDoS Attacks, DNS
U.S. Army Private First Class Bradley Manning accused of sharing thousands of classified government documents with WikiLeaks, knew that the information would aid enemies of the U.S., a prosecutor argued Monday. Manning, facing a court ...
HTC Corporation, a global leader in mobile innovation and design, today announced the new HTC One as its first HTCpro -certified device in the United States. The new HTC One is designed to exceed the expectations of business customers ...
Tags: US, HTC One, Consumer Electronics
Internet communities are more trustworthy than some big corporations, but mobile is proving a hard nut to crack even for the best of them, actor and venture capitalist Ashton Kutcher told CTIA Wireless Thursday. "Facebook is the new ...
Tags: Facebook, Ashton Kutcher, Computer Products
Mobile operators collect huge amounts of data about how their subscribers use mobile data, and that information is starting to go on sale as targeted intelligence that enterprises can use to better reach consumers. SAP will introduce a ...
Tags: Mobile, SAP, Computer Products
Mobile operators collect huge amounts of data about how their subscribers use mobile data, and that information is starting to go on sale as targeted intelligence that enterprises can use to better reach consumers. SAP will introduce a ...
Tags: Mobile Use, cloud service, Computer Products
A recent intrusion on the computer network of Norwegian telecommunications company Telenor was the result of a large cyberespionage operation of Indian origin that for the past few years has targeted business, government and political ...
Tags: Computer Products, software
Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
Tags: Computer Products, software
Security researchers from Trend Micro have uncovered an active cyber-espionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
Security researchers from Damballa have found a new variant of the Pushdo malware that's better at hiding its malicious network traffic and is more resilient to coordinated takedown efforts. The Pushdo Trojan program dates back to early ...
Tags: Pushdo Botnet, Takedown Attempts
Security researchers from Russian cybercrime investigations firm Group-IB have uncovered a cyberfraud operation that uses specialized financial malware to target the customers of several major Australian banks. Over 150,000 computers, ...
Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks. The Research and Education Networking Information Sharing and Analysis Center ...