Last week's attack on the Virgin Radio Dubai website could have provided cyber-criminals with a springboard from which to launch targeted attacks, according to a researcher from Kaspersky Lab. The popular music station's website was taken ...
Tags: Computer Products
Apple on Monday took the wraps off iOS 7, revealing a dramatic new design that sheds six-year-old interface elements, and replaces them with a cleaner, more modern aesthetic. From top to bottom, the OS that powers the iPhone, iPad, and iPod ...
Apple senior vice president of software engineering Craig Federighi introduced the next iteration of Apple's Mac operating system on stage during Monday's?Worldwide Developers Conference?kick-off. Federighi began his presentation with a sly ...
Tags: Apple, Computer Products
In a recent survey, we asked subscribers about how they use their mobile devices. One finding: Twenty-eight percent of tablet owners said children 17 or younger also used their tablet. Some portion of parents who share their tablets with ...
Tags: Tablet, Consumer Electronics
Now that developers have had a few days to delve into the iOS 7 beta, it's becoming clear that the iPhone version of the software could prove beneficial to enterprises. Many members of the 120-person development team at Solstice Mobile in ...
Tags: iOS 7, Enterprises
Microsoft is upping the security on Azure with Active Authentication, a new service now in preview which allows enterprises to secure access to hosted applications such as Office 365 with two-factor authentication. Active Authentication ...
Tags: Microsoft, Cloud, Two-Factor Authentication
Apple on Monday trumpeted OS X 10.9, or Mavericks, but made a U-turn from past practice and declined to name a price for the upgrade or tap a ship date as anything more specific than the fall. The departure from tradition lends credence ...
A defiant Edward Snowden resurfaced in Hong Kong today vowing to fight any U.S. efforts to extradite him on charges that he leaked classified documents describing two secret government data collection programs. In comments to the South ...
Tags: NSA, Classified Data, Edward Snowden
WHILE Melburnians love their food it seems that residents of Australia?s northern cities are in love with themselves, the first survey of Instagram?s million local users reveals. So called ?selfies? were the top choice of picture Sydney, ...
Don't like the song playing on the stereo? Just wave it goodbye, literally. That's the vision of a team of researchers at the University of Washington's Networks Lab, who are developing a new gesture recognition technology called "WiSee," ...
Tags: Wi-Fi, Gestures, Smart Home
Computerworld - A federal judge in Wisconsin has ordered a suspect in a child porn investigation to either provide prosecutors with the passwords to several encrypted storage devices of his that are thought to contain incriminating evidence ...
Tags: Decryption, Computer Products
Threats from malware specifically targeting social media and the number of spam emails have both risen significantly in the first quarter of this year. That's according to the McAfee Threats Report: First Quarter 2013, which reveals that ...
Tags: Social Media Malware, McAfee
If you’re worried that a disgruntled former coworker will hack your LinkedIn account and add embarrassing details to your resume, fear not: The social network for professionals has at last added two-factor authentication to prevent ...
When it comes to smartphone safety, the single most important thing a mobile phone owner can do is lock the device with a unique, four-digit PIN. That's been the opinion of many experts for years, but the advice still holds, including ...
Add LinkedIn to the list of Internet companies trying to make themselves safer from cyberattacks by adding two-step authentication. Users of the professional social-networking site now have the option to add two-step verification to their ...