Computerworld - Arab-Israeli lawmakers and religious leaders Wednesday asked the Jerusalem District Court to force Google to take a controversial video off of YouTube. The petition also asks that all access to the video be blocked in ...
Tags: Google, controversial video, video, Web
Rackspace was one of the first players in the cloud arena. The company recognized early that enterprises wanted faster, simpler ways to spin up and spin down servers. If the bosses are going to be fickle and impulsive, there will always be ...
Tags: Rackspace, cloud arena, IT, IaaS
A hacker is selling a$700 zero-day exploit for Yahoo Mail that lets an attacker use a cross-site scripting(XSS)vulnerability to steal cookies and hijack accounts. The hacker,known as"TheHell",created a video to market the exploit on an ...
Tags: hacker, Yahoo mail
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, says an independent security researcher. A limited ...
Tags: Attackers, emails, private data, Yahoo users
SAN DIEGO, CA, July 04, 2012 /24-7PressRelease/ -- Wixie, Tech4Learning's popular student creativity tool, is now available as part of Google's Education App Packs. The newly released Education App Packs are select groups of recommended web ...
2X ApplicationServer XG v10.5 Brings Together Application Delivery, VDI & Thin Client Management from a Single Platform DALLAS, TX, September 07, 2012 /24-7PressRelease/ -- 2X Software today announced the release of Version 10.5 of its ...
Tags: ApplicationServer, Computer Products, VMware, Citrix Xen Server
Spammers have found a way to abuse a URL shortener service destined for U.S. government social media activities in order to craft rogue .gov URLs for work-at-home scams. Security researchers from Symantec have detected a new email spam ...
Tags: Spammers, URL shortener service, U.S.government, social media activities
They say no one can hear you scream in space, but if you so much as whisper on the Web, you can be tracked by a dozen different organizations and recorded for posterity. Simply visiting a website can allow its operators to figure out your ...
Tags: device information, advertising cookies, web
PC World - Google has acquired Web-based URL scanner VirusTotal in what may be an effort to improve browser security. VirusTotal's service is pretty simple: Visit the website and either select a file to scan or paste in a URL. Also ...
Tags: Google, URL scanner, VirusTotal, company news
Infoworld - Hewlett-Packard may be best known for its ubiquitous printers and laptops, but in the enterprise world, it is just as recognized for its servers. Now that the idea of the cloud is taking over, HP is joining the marketplace and ...
Tags: Hewlett Packard, laptop, HP, HP Cloud
IDG News Service - The Russian version of Wikipedia went black on Tuesday to protest a proposed law that could become the basis for Internet censorship. Wikipedia's protest is backed by other large Russian online businesses such as the ...
Tags: Internet censorship, electronic curtain, firewall, Wikipedia
Earlier this month fans of the good old GNOME 2 desktop environment got some exciting news when it became clear that a version of Ubuntu Linux featuring the classic desktop was in the works. Now, plans for that new Ubuntu flavor are ...
Tags: GNOME 2, desktop environment, Ubuntu Linux, classic desktop
Earlier this month fans of the good old GNOME 2 desktop environment got some exciting news when it became clear that a version of Ubuntu Linux featuring the classic desktop was in the works. Now, plans for that new Ubuntu flavor are ...
Tags: GNOME 2, desktop environment, Ubuntu Linux, classic desktop
Google today launched a version of its Chrome browser for iOS, the Apple mobile operating system that powers the iPhone and iPad. The company confirmed that the browser is essentially Safari in disguise, as Chrome relies on Apple's ...
Tags: iPhone, iPad, Google, Chrome browser, iOS, Apple, mobile operating system
Hackers using a Remote Access Trojan (RAT) named Mirage have been engaged in a systematic cyber espionage campaign against a Canadian energy company, a large oil firm in the Philippines and several other entities since at least this April, ...
Tags: Hackers, RAT, Mirage, systematic cyber espionage, energy company