Hewlett-Packard plans to use its recently announced SDN controller to distribute its TippingPoint intrusion prevention system across networks, overcoming the scale limitations of dedicated appliances. The research project, called ...
Tags: HP, Network Security, SDN
Access to software collaboration site GitHub appeared to be restored in China on Wednesday, just as former Google executive Kai-Fu lee criticized its blocking as a senseless move that would harm the nation's developers. GitHub, a U.S. ...
Tags: software collaboration, GitHub, China
The weekend saw Dropbox users frustrated by issues with syncing and uploading files, as well as creating shareable links. The issues became so severe that the stability of Amazon Web Services (AWS) was called into question. According to a ...
20,000 PCs in the UK could be cut off from the web on Monday 9 July 2012, as a consequence of the DNS Changer virus. Infected machines will no longer be able to access websites, e-mail, chat or social networking sites such as Facebook, ...
Tags: UK, computer, DNS Changer virus, networking site, cyber security
The Internet Corporation for Assigned Names and Numbers (ICANN) said it would take up to December to come up with a process for handling the large number of applications for gTLDs (generic top-level domains). There are close to 2,000 ...
Tags: ICANN, December, applications, gTLDs
IDG News Service - Well Fargo urged its customers on Thursday to visit bank branches or use telephone banking due to continuing problems with its website. In a statement, a bank spokeswoman described the issue as "an unusually high volume ...
Tags: Well Fargo, telephone banking, website, company news
A recent study by four UCLA documents what some wireless data customers have long suspected -- that users can be charged for wireless data they never received. In the most extreme case of overcharging, an unnamed carrier charged the ...
Tags: UCLA, study, wireless data, overcharging
There are all kinds of Linux servers. The most complicated of these require you to be a Red Hat Certified Engineer (RHCE). Many of them require you to do more than download a distro, burn a CD, and install and boot up your new bare-bones ...
Tags: Linux servers, RHCE, Amazon, cloud
Facebook has begun warning users whose computers are infected with the DNSChanger malware, a variant of the Zlob family of Trojans. The malware is designed to tell the infected computer to use a rogue Domain Name System (DNS) server, ...
Tags: Facebookm, computer security, DNSChanger malware, Trojans
Monday, 9 July, was supposed to be 'Internet Doomsday' when the US' Federal Bureau of Investigation (FBI) was to shut down servers associated with the DNSChanger malware. As a result, computers infected with this threat were to be cut off ...
Tags: USA, DNSChanger malware, FBI, computer
The wave of cyberattacks against a half-dozen U.S. financial institutions has subsided this week, but the recent demonstration of force shows a careful honing of destructive techniques that could continue to cause headaches. The attacks ...
Tags: cyberattacks, financial institutions, could, banking websites
Amazon Web Services (AWS) recent storm-related outage, which left Web sites including Netflix, Pinterest, and Instagram inaccessible, is just the latest in a string of costly cloud failures. Since 2007, a total of 568 hours of downtime at ...
Tags: AWS, Disaster Preparedness Questions, Cloud Services Provider, IWGCR
Security researchers disclosed critical vulnerabilities in routers from Chinese networking and telecommunications equipment manufacturer Huawei at the Defcon hackers conference on Sunday. The vulnerabilities -- a session hijack, a heap ...
Tags: critical vulnerabilities, Huawei, Defcon, security
The UK should take more control of the internet to counter the US stranglehold, says an IT entrepreneur. “A British scientist invented the world wide web, so why are we now made to feel lucky to be involved?” said Scott ...
Tags: UK, IT industry, US stranglehold, IT service
Researchers from security vendor Damballa have identified malicious Internet traffic that they believe is generated by a new and elusive variant of the sophisticated TDL4 malware. The new threat, which has been assigned the generic name ...
Tags: TDL4 malware, Internet traffic, elusive variant, Fortune 500 Companies