IDG News Service - Microsoft has announced the consumer and small-business prices for the new Office suite, which will be sold both via traditional single-device, perpetual licenses and via a new annual, multi-device cloud subscription. ...
Tags: Microsoft, cloud subscription, new Office suite, software, company news
DENVER, CO, July 28, 2012 /24-7PressRelease/ -- Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or ...
Tags: Computer hackers, computer systems, computer security, Software, iComputer
A new survey by technical support website FixYa indicates that users of the top five cloud storage services are most concerned about capacity, security and missing files. FixYa asked users of its service about the top five issues cloud ...
Tags: issues, FixYa, cloud storage services, capacity, security, missing files
In a new twist, spammers have built a botnet that sends SMS spam through infected Android phones, shifting the potentially pricey cost of sending spam to victims. The trend, spotted by security vendor Cloudmark, poses a new challenge for ...
Tags: botnet, SMS spam, Android phones, victims
Europe's top data privacy agency has launched a formal investigation into Microsoft's privacy policy. Microsoft confirmed on Tuesday that it had received a letter from the Article 29 Working Party that it would proceed with a probe. On ...
Tags: Europe, data privacy agency, Microsoft, privacy policy
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, says an independent security researcher. A limited ...
Tags: Attackers, emails, private data, Yahoo users
Malware attacks seem to be evolving. The traditional viruses, Trojan horses, botnets and phishing attacks are still a threat, but the next generation malware takes insidious to a whole new level. Thankfully, theres a silver lining as well. ...
Tags: Malware, attacks, traditional viruses, Trojan horses, botnets
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
Preferred Market Solutions, LLC., developers of Preferred Patron Loyalty Marketing Software with Integrated Email , announced today they have received accreditation from SuretyMail, an Email Accreditation service of ISIPP . "SuretyMail ...
Tags: Preferred Market Solutions, Marketing Software, software, company news
N-able's new Security Manager | Anti Spam built on Roaring Penguin Software's CanIt OTTAWA, ON, CANADA, October 04, 2012 /24-7PressRelease/ -- Roaring Penguin Software Inc., maker of the acclaimed CanIt line of anti-spam solutions, today ...
Tags: N Able Technologies, Roaring Penguin Software, Software
The UK, the US, Australia and a number of other countries have refused to sign a new international telecommunications treaty after the final text was pushed through in a "forced" vote. Further reading US prepared to walk out of ITU ...
Free mobile apps pose a serious threat to privacy because of their ability to capture large amounts of user information, a study has revealed. Free mobile applications are 401% more likely to track user location and 314% more likely to ...
Tags: free mobile apps, Juniper Networks, information, applications
Two digital rights group urged Facebook on Tuesday to halt changes to its governance and data use policies, warning the modifications could increase privacy risks. Facebook said last Wednesday it would no longer allow users to vote on ...
Tags: digital rights group, Facebook, governance, data use policies
Google has introduced stricter rules for applications on its Android mobile operating system to reduce the number of malicious apps in the Google Play app market and improve its reputation. The revised Google Android developer policy ...
Tags: Google, Android Policy, Malicious Apps, Google Play app
The second quarter of 2012 saw the biggest increase in malware samples detected in the past four years, says security firm McAfee. Researchers detected a 1.5 million sample increase in malware since Q1 2012, according to the firm’s ...
Tags: McAfee, malware spike, Computer Products