The Internet Corporation for Assigned Names and Numbers (ICANN) has selected three emergency back-end registry operators to guarantee domain names within a new generic top-level domain (gTLD) will resolve in the event of a failure at a new ...
Tags: Computer Products, software, ICANN
There are opportunities for big data in cyber security, according to technology specialist at BSkyB Jamie Randall. Speaking at Computing's Big Data Summit 2013 today, Randall said that big data could be used to interpret alerts and ...
Tags: Computer Products, software
Enterprises that use mobile device management (MDM) systems to protect their corporate data on employees' mobile phones are not safe from attacks from spyphones, researchers warned at BlackHat Europe on Thursday. Over the next five years, ...
Tags: MDM, software, Computer Products
Microsoft will issue security fixes for its Windows Store apps on the fly, not just on the familiar monthly Patch Tuesday, the company said this week. At the same time, Microsoft spelled out how it will alert customers of security ...
Tags: APP, software, windows, Computer Products, Microsoft
Google has launched a site for webmasters whose sites have been hacked, something that the company says happens thousands of times every day. The new site features articles and videos designed to help webmasters identify, diagnose and ...
Tags: Google, Webmasters, Hacked Sites resource
Google has launched a site for webmasters whose sites have been hacked, something that the company says happens thousands of times every day. The new site features articles and videos designed to help webmasters identify, diagnose and ...
Tags: Google, Computer Products
Jordan - the country, not the model - has unveiled a 25-teraflop supercomputer based on Sony PlayStation 3 (PS3) hardware. The IMAN1 computer had its first public outing at the MENA ICT Forum in Amman last week, unveiled by Zaid Abudayeh, ...
Tags: supercomputer, Jordan, Sony PlayStation 3
Trader Media Group (TMG), which owns Auto Trader, could replace its iPhone estate with Windows Phones, while Android will not be considered as it "has too many security vulnerabilities". In an exclusive interview with Computing, TMG CIO ...
Tags: Trader Media Group, Windows Phones, security vulnerabilities
A new exploit for a previously unknown and unpatched Java vulnerability is being actively used by attackers to infect computers with malware, according to researchers from security firm FireEye. "We observed successful exploitation ...
Tags: Computer Products, Computer, software
Finsphere says flash storage reduced cost per IOP by nine times Flash storage array vendor Violin Memory announced a new customer in the shape of Finsphere, a provider of identity authentication services to global financial institutions. ...
Tags: Finsphere, flash storage, IOP
A Polish security firm known for rooting out Java vulnerabilities has reported two new bugs in the browser plug-in to Oracle, Security Explorations said today. On its bug-reporting status page, Security Explorations noted that it had ...
Tags: Java vulnerabilitie, Oracle, company news
Smartphone manufacturer HTC has agreed to settle Federal Trade Commission (FTC) charges that the firm failed to take "reasonable steps" to patch security vulnerabilities in its products, thus putting information belonging to millions of ...
Tags: HTC, obile Security Flaws, company news
HP on Monday unveiled its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary with its ArcSight security-event and information management (SIEM) can ...
Tags: HP, Big Data Security Strategy, SIEM
The U.S. Federal Trade Commission has reached a settlement with HTC America over security holes in the company's smartphone and tablet software that left millions of users' personal information at risk. Under the terms of the agreement, ...
Tags: HTC America, smartphone, tablet, software
Google yesterday released Chrome 25, patching 22 vulnerabilitiesand debuting a new security feature that blocks silent installations of add-ons. The latter is Chrome 25's most noticeable change to users. It automatically disables ...
Tags: Google, security feature, Chrome