Microsoft will "draw a line in the sand" come April 2014 when Windows XP exits support, security researchers said today, even if millions of customers are still running the aged OS and a zero-day bug threatens the Windows ecosystem. Or ...
Tags: Microsoft, Windows XP, OS, Windows ecosystem
LinkedIn says the forensic investigation and other recovery costs of the data breach in June could have topped $1m. The professional social network confirmed that "some" of the stolen passwords posted online by a hacker correspond to ...
Tags: LinkedIn, social network, Internet, networking
And now, the end is near. On 23 November 2012, Gerry Pennell will leave the job of a lifetime. Four years after signing up as CIO for the London 2012 Olympics and Paralympics, his IT team has won every technology gold medal going after ...
Tags: Gerry Pennell, CIO, London 2012 Olympic Games, IT systems
The UK Police Central e-Crime Unit (PCeU) has arrested three people in connection to using ransomware, which security experts say poses a threat to businesses as well as consumers. Ransomware is malicious software that is inadvertently ...
Tags: Ransomware, software, computer, blackmailers
The wave of cyberattacks against a half-dozen U.S. financial institutions has subsided this week, but the recent demonstration of force shows a careful honing of destructive techniques that could continue to cause headaches. The attacks ...
Tags: cyberattacks, financial institutions, could, banking websites
IDG News Service - Adobe plans in February to close a dangerous hole in its Shockwave application that causes the application to be downgraded when a user launches older multimedia content, allowing hackers to target years-old ...
Tags: Adobe, close, dangerous hole, Shockwave application
The Ghost Shell group, an offshoot of the Anonymous hacking collective has published the log-in details from 1.6 million accounts. The credentials were stolen from a series of hack attacks on Nasa, the FBI, the European Space Agency and ...
An increasing number of vulnerability researchers will focus their attention on industrial control systems(ICS)in the year to come,but so will cyberattackers,security experts believe. Control systems are made up of supervisory software ...
Tags: SCADA security, ICS, critical infrastructure, control systems
A suspected fault in how Samsung Electronics has implemented the Android's kernel in several of its devices could allow a malicious application to gain total control over the device. The vulnerability was described on Saturday by the user ...
Tags: Samsung, Computer Products, Android
A trio known for their prowess in hacking Apple's iPhone software indicated on Thursday they may be edging closer to breaking the improved security measures in iOS 6. The hackers, who spoke at the Hack in the Box security conference in ...
Cloudnymous, the first cloud-based anonymity service, has expanded its number of available VPN servers locations. Cloudnymous's VPN servers are now located in 8 countries around the globe, and scaling up to new locations is fully automated. ...
Tags: Cloudnymous, cloud-based, anonymity service, VPN servers
The mother of hacker Gary McKinnon marked the end of a traumatic chapter of their lives when she give thanks to all those who helped their 10-year campaign against a US order for his extradition to face charges for hacking federal ...
Tags: Gary McKinnon, hacking federal computer, home secretary, computer
As more traditional business functions become cloud offerings, there are certain questions organisations need to ask before moving to the cloud. This was the message of Mike Lynch, the former CEO of HP-owned Autonomy, who left the company ...
Tags: cloud offerings, Autonomy, cloud computing, IT industry, computer
IBM and Oracle shared more details this week about new RISC chips they're building for server customers, the Power7+ in the case of IBM and the T5 for Oracle. The Unix server market continues to contract as x86-based systems gain more ...
Tags: IBM, Oracle, RISC chips, server customers
Microsoft may have known about last week's Internet Explorer (IE) zero-day bug for some time, according to its security advisory. The vulnerability, which was patched Friday in an emergency, or "out-of-band," update, first became public ...
Tags: Microsoft, IE, bug, vulnerability