The weekend saw Dropbox users frustrated by issues with syncing and uploading files, as well as creating shareable links. The issues became so severe that the stability of Amazon Web Services (AWS) was called into question. According to a ...
IDG News Service - Turktrust, the Turkish certificate authority (CA) responsible for issuing an intermediate CA certificate that was later used to generate an unauthorized certificate for google.com, claims that the bad Google certificate ...
Tags: Google certificate, Google, Microsoft, Internet
As a new session of the U.S. Congress convenes in early 2013, don't expect lawmakers to rush out a new version of the Stop Online Piracy Act (SOPA) or the Protect IP Act (PIPA). While some groups representing copyright holders still want ...
Tags: U.S.Congress, SOPA, 2013, PIPA
The House Judiciary Committee is moving toward passage of a small portion of the controversial Stop Online Piracy Act, raising concerns among SOPA opponents. The committee has released a draft bill, called the Intellectual Property ...
Tags: SOPA, online piracy, intellectual property, USA
IDG News Service-The Internet Corporation for Assigned Names and Numbers has proposed holding an old-fashioned raffle to determine which applications for new top-level domains should be handled first.To make the lottery legal,the ...
IDG News Service-U.S.Immigration and Customs Enforcement has seized 70 websites accused of selling products that infringe copyright,bringing the number of websites seized by ICE in the last two years to 839. The websites recently seized ...
Technology firms including Google,Apple,eBay and Yahoo were among almost 300 companies whose websites were hit by a hack attack in Pakistan. The attack,which exploited vulnerabilities in domain name systems(DNS)to redirect ...
Tags: Googl, Technology firms, attack in Pakistan
20,000 PCs in the UK could be cut off from the web on Monday 9 July 2012, as a consequence of the DNS Changer virus. Infected machines will no longer be able to access websites, e-mail, chat or social networking sites such as Facebook, ...
Tags: UK, computer, DNS Changer virus, networking site, cyber security
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, says an independent security researcher. A limited ...
Tags: Attackers, emails, private data, Yahoo users
The Internet Corporation for Assigned Names and Numbers (ICANN) said it would take up to December to come up with a process for handling the large number of applications for gTLDs (generic top-level domains). There are close to 2,000 ...
Tags: ICANN, December, applications, gTLDs
BEAVERTON, OR, July 14, 2012 /24-7PressRelease/ -- Budget Windows VPS Hosting plans are now a part of Cyberls Hosting product portfolio. The new product has been designed to provide world class reliability, speed and flexibility to todays ...
Tags: Budget Windows VPS Hosting, Cyberls Systems, Microsofts Hyper-V, VPS
IDG News Service - Well Fargo urged its customers on Thursday to visit bank branches or use telephone banking due to continuing problems with its website. In a statement, a bank spokeswoman described the issue as "an unusually high volume ...
Tags: Well Fargo, telephone banking, website, company news
Google, Microsoft and Yahoo have remedied a cryptographic weakness in their email systems that could allow an attacker to create a spoofed message that passes a mathematical security verification. The weakness affects DKIM, or DomainKeys ...
Tags: Google, Microsoft, Yahoo, cryptographic weakness, email systems
Spammers have found a way to abuse a URL shortener service destined for U.S. government social media activities in order to craft rogue .gov URLs for work-at-home scams. Security researchers from Symantec have detected a new email spam ...
Tags: Spammers, URL shortener service, U.S.government, social media activities
A recent study by four UCLA documents what some wireless data customers have long suspected -- that users can be charged for wireless data they never received. In the most extreme case of overcharging, an unnamed carrier charged the ...
Tags: UCLA, study, wireless data, overcharging