The Internet Society today sends the message around the world that it is time to embrace IPv6. A number of high-profile technology companies will turn on the protocol and make the permanent transition from IPv4. "Major internet ...
Tags: IPv6, IPv4, ISP, permanent transition
A judge has approved the text of a letter that is to be sent to O2 customers suspected of illegally sharing adult films made by Ben Dover Productions. In March, the film company won a court order forcing O2 to identify the users of more ...
Tags: O2, illegally sharing, adult films, Golden Eye, piracy
IT Governance Ltd, a leading cybersecurity management service provider, is warning organisations that they are exposed to ever greater risks resulting from new Internet-based threats being launched faster than ever. IT Governance Ltd, a ...
Tags: Web Based Applications, Productivity, Security, Computer Products
The hacker group that recently infected Israeli police computers with the Xtreme RAT malware has also targeted government institutions from the U.S., U.K. and other countries, according to researchers from antivirus vendor Trend Micro. ...
Tags: hacker group, Xtreme RAT malware, U.S., U.K.
The Internet Corporation for Assigned Names and Numbers (ICANN) said it would take up to December to come up with a process for handling the large number of applications for gTLDs (generic top-level domains). There are close to 2,000 ...
Tags: ICANN, December, applications, gTLDs
Kim Dotcom, founder of the filesharing site Megaupload, which was shut down by US authorities, has revealed its replacement, Mega, which he says will protect file uploaders' identities. The website will use encryption to prevent users ...
Tags: Kim Dotcom, US, Megaupload, anti-piracy
The general availability of Windows Server 2012 today will see Microsoft’s strongest push yet to target VMware users. Microsoft describes the new operating system (OS) – an update to the three-year-old Windows Server 2008 OS ...
Tags: VMware, Computer Products, Windows Server
Customers of British internet service provider (ISP) UK2 have been unable to receive emails from any Yahoo/BT Internet accounts for the past week, due to the two firms blocking their IP addresses. Computer Weekly has seen an email from ...
Tags: BT, Yahoo, Computer Products, IP Addresses
Privacy advocates and consumer rights groups are keeping a wary eye on a new copyright enforcement mechanism set to be rolled out by major Internet Service Providers. The so-called Copyright Alert System (CAS) aims to warn Internet users ...
In the last five years mobile data has grown significantly and now generates just under 700 petabytes per month. According to internet firm Akamai, there is now four times as much data as voice traffic on mobile networks. In the first ...
Tags: Mobile Data, Computer Products, Akamai
Security researchers have collaborated to take down Grum, the world's third-largest botnet of hijacked computers. The Grum botnet is believed to have been responsible for around 18% of global spam, or 18 billion spam messages a day. ...
Tags: Security Researchers, Grum, hijacked computers, global spam, spam messages
IDG News Service - Cybercriminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. ...
Tags: Cybercriminals, computer, malware, commercial proxy service
IDG News Service - Google on Thursday dismissed the possibility that a new wave of pharmacy, penny stock and e-card spam emails are being sent by Android spam botnets. "Our analysis suggests that spammers are using infected computers and ...
Tags: Google, pharmacy, penny stock, spam email, computers
IDG News Service - Content delivery accelerator Akamai Techologies has launched a service for adapting websites to the device used to access them, which it says also simplifies the upgrade to IPv6. The service, Aqua Ion, has been shaped ...
Tags: Akamai Techologies, Blaze Software, Akamai platform, smartphones
Hackers using a Remote Access Trojan (RAT) named Mirage have been engaged in a systematic cyber espionage campaign against a Canadian energy company, a large oil firm in the Philippines and several other entities since at least this April, ...
Tags: Hackers, RAT, Mirage, systematic cyber espionage, energy company