A recent study by four UCLA documents what some wireless data customers have long suspected -- that users can be charged for wireless data they never received. In the most extreme case of overcharging, an unnamed carrier charged the ...
Tags: UCLA, study, wireless data, overcharging
IDG News Service - Cybercriminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. ...
Tags: Cybercriminals, computer, malware, commercial proxy service
Google today launched a version of its Chrome browser for iOS, the Apple mobile operating system that powers the iPhone and iPad. The company confirmed that the browser is essentially Safari in disguise, as Chrome relies on Apple's ...
Tags: iPhone, iPad, Google, Chrome browser, iOS, Apple, mobile operating system
Hackers using a Remote Access Trojan (RAT) named Mirage have been engaged in a systematic cyber espionage campaign against a Canadian energy company, a large oil firm in the Philippines and several other entities since at least this April, ...
Tags: Hackers, RAT, Mirage, systematic cyber espionage, energy company
Amazon is adding a Cross-Origin Resource Sharing capability to its S3 Simple Storage Service, allowing developers to more easily build web applications that access data stored in the company's cloud. Developers can now implement ...
Tags: Amazon, Resource Sharing capability, S3 Simple Storage Service
A sophisticated cyber surveillance tool that monitors financial transactions with Middle Eastern banks was probably built by or under the auspices of a government, security researchers said today. Early Thursday, Moscow-based Kaspersky ...
Tags: cyber, financial transactions, Middle Eastern, banks, security
Many organisations are being misled about the complexities surrounding IPv6 security, according to security firm Stonesoft A number of high-profile technology companies have set 6 June as the date for turning on the protocol and make ...
Tags: IPv6 security, Stonesoft, software, IPv6 traffic
Security researchers from Symantec have identified an information-stealing Trojan program that was used to infect computer servers belonging to various U.S. financial institutions. Dubbed Stabuniq, the Trojan program was found on mail ...
The Iranian government appears to have blocked access to Google's search engine and Gmail webmail service from inside Iran, according to Internet users there. A security researcher going by the Twitter handle of @0xal reported late Sunday ...
Tags: Iran, Blocks Access, Gmail, Google
Today, search engine Metro5 has announced the launch of it's open BETA program. The idea behind Metro5 is to deliver a set of up to 50 relevant results for each web search query, while taking social influence into account when ranking these ...
Tags: Metro5, web search query, search engine, website rank
Microsoft CEO Steve Ballmer saw his bonus shrink a little in 2012 while that of other Microsoft executives rose significantly, the software maker said Tuesday. Ballmer received a bonus payment of US$620,000, about 91 percent of his ...
Tags: Microsoft, Steve Ballmer, Windows, Windows server
Cyber criminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. Three months ...
Tags: Black Market, malware, Proxy, Symantec, Computers
The Iranian government appears to have blocked access to Google’s search engine and Gmail webmail service from inside Iran, according to Internet users there. A security researcher going by the Twitter handle of @0xal reported that ...
Tags: Blocked, cyber attack, Gmail, Google, Security
With each year, Oracle becomes a bigger company and in turn, so does its annual OpenWorld conference, which kicks off Sunday in San Francisco. In fact, Oracle's long run of acquisitions, spanning from applications to middleware to ...
Tags: Oracle, OpenWorld conference, 2012
Amazon is adding a Cross-Origin Resource Sharing capability to its S3 Simple Storage Service, allowing developers to build web applications that access data stored in the company’s cloud far more easily. Developers can now implement ...
Tags: Amazon, cloud, cloud computing, Storage service, Web friendly