Facebook is working hard to assure users that Graph Search, its new search engine designed to uncover all sorts of information buried within the site, does not compromise the privacy rights of minors. "As with all of our products, we ...
Tags: Facebook, site, Graph Search
Google+ suffered a site outage Friday morning, prompting users of the social network to complain on both Google+ and Twitter that the site was down or slow to load. According to Google, the outage was over by late morning, East Coast ...
Tags: Google, social network, Computerworld
IDG News Service - Facebook said Friday it had been the target of a sophisticated hacking attack but that it had no evidence any user data had been compromised. The attack comes two weeks after Twitter asked 250,000 of its users to reset ...
Apple says it has been hit by hackers who wormed their way into the California company's system but evidently failed to steal any data. The maker of iPhones, iPads, iPods, and Macintosh computers said it is working with law enforcement ...
Tags: APPLE, iPhones, iPads, iPods, Macintosh computers
Tizen, the open-source project backed by Intel and Samsung, on Monday released the software development kit and source code for a new version of its operating system to software developers and device manufacturers. The Tizen 2.0 release ...
Facebook has admitted that laptops belonging to its employees were recently infected by malware, blaming a zero-day Java exploit for the incident. Users of the social network will be concerned that their private data may have been ...
Tags: Facebook, malware, zero-day Java exploit
Microsoft's SkyDrive cloud storage service now has one billion Office documents stored in it, the company announced today. While a billion may seem like a lot, the most popular consumer cloud storage service, Dropbox, has more than ...
Tags: Microsoft, SkyDrive cloud storage service, company news
Oracle isn't done releasing patches for Java SE this month, as another batch will arrive Feb. 19, according to a company blog post. On Feb. 1, Oracle pulled the trigger early on the February release, which had originally been scheduled ...
Two U.S. lawmakers plan to reintroduce a controversial cybersecurity bill that allows private companies to share customers' personal information related to a wide range of cyberthreats with government agencies. Representatives Mike ...
Tags: cybersecurity, U.S., bill
One week after launching a security bug bounty program, the new file-storage and sharing service Mega claims to have fixed seven vulnerabilities, none of which met its highest severity classification. Since Mega was launched three weeks ...
Tags: Mega, security bug, file-storage, file-sharing
Apple is experimenting with watch-like wearable devices with some smartphone capabilities, as the company looks at new product categories for future growth, according to reports. The company has discussed the design with manufacturing ...
Microsoft started selling its Surface Pro tablet on Saturday, and quickly exhausted its supply of the 128GB configuration. While the less expensive 64GB device was also listed as out of stock Saturday on Microsoft's online store, by ...
A recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and is probably part of an important cyberespionage operation, the head of the malware analysis team at ...
Tags: Adobe Reader, anti-exploitation protection, Adobe Reader Sandbox
LinkedIn has shut off its API access to "Bang With Professionals," a Web service that was intended to facilitate more, say, intimate connections among users of the business-oriented social networking site. The service was designed to ...
Tags: LinkedIn, API, social networking
Devices used by many radio and TV stations to broadcast emergency messages as part of the U.S. Emergency Alert System (EAS) contain critical vulnerabilities that expose them to remote hacker attacks, according to researchers from security ...
Tags: U.S.Emergency Alert System, remote hacker attacks, cyber security