Buyers of computers running Windows RT, the Windows 8 version for ARM-based devices, will receive at no additional cost a version of Office that will become available in multiple languages between November and January. The devices, ...
Tags: ARM devices, highlightedpost, Microsoft, Office, Windows
Microsoft's"Secure Boot"plans for Windows 8 have already caused no end of controversy in the Linux community,and certainly one of the more divisive announcements in recent months was Canonical's decision to drop the GRUB 2 bootloader as ...
Tags: Ubuntu Linux, Microsoft, Windows 8, Secure Boot, FSF
Google has bought Wildfire Interactive,a social media marketing start-up that provides a platform for organisations to manage all of their social media output on one system. The software is used to help companies run and measure their ...
Tags: Google, Social Media, Software, Wildfire
Symantec last week crippled a large number of Windows XP machines when it shipped customers a defective update to its antivirus software,the company acknowledged Friday. "After a full evaluation and root cause analysis...we have ...
Tags: Symantec, SONAR, Windows XP PCs, BSOD, SEP
Mobile network operator O2 claims it has fixed network problems that left hundreds of thousands of customers without voice and data connections for up to 24 hours. The firm has issued a string of apologies, but has not yet made any ...
Tags: Computer Products, O2, GiffGaff and Tesco Mobile, still having problems
Hackers have compromised two servers used by the FreeBSD Project to build third-party software packages.Anyone who has installed such packages since Sept.19 should completely reinstall their machines,the project's security team warned. ...
Tags: hackers, FreeBSD, third-party software packages, SSH Keys
Cloud storage provider Dropbox has confirmed that usernames and passwords stolen from other websites were used to sign in to a small number of Dropbox accounts. "A stolen password was also used to access an employee Dropbox account ...
Google is rolling out a tool for Apps administrators to search through Gmail logs,the company announced on Tuesday. The feature,available in the Apps control panel,has long been requested by IT administrators of the cloud collaboration ...
Tags: Google, Apps Admins, Apps administrators, Gmail logs
A computer worm that propagates by exploiting a 2010 Windows vulnerability is responsible for some of the recent incidents involving network printers suddenly printing useless data,according to security researchers from Symantec. Many ...
Tags: rogue printouts, Security Researchers, computer worm, Trojan program
Cyber criminals are increasingly using .eu domain names in their attack campaigns, according to data from multiple security companies. “Numerous malicious .eu domains have been registered during November which are being used to ...
Tags: cyberattacks, cybercrime, highlightedpost, malware
Criminals broke into an Adobe server and provided two pieces of malware with a digital certificate that attest to them being legitimate code. As a result of the breach, the company will revoke the certificate next Thursday and will update ...
Tags: Adobe, Criminal, cyber crime, highlightedpost, malware
Microsoft started accepting on Wednesday requests for access to the Windows Phone SDK 8.0 Developer Preview programme, the company said in a blog post. To apply, developers can go to the Microsoft Connect site, and the deadline is Sept. ...
Tags: Microsoft, SDK, developer preview programme, Windows, windows phone 8
Facebook has restricted the rate at which users can perform phone number searches on its mobile website in order to block a recently disclosed method of harvesting phone numbers. “The ability to search for a person by phone number ...
Tags: Accounts, Facebook, highlightedpost, Mark Zuckerberg, Passwords, security
Enterprise cloud computing company Salesforce.com said Monday it has entered into a definitive agreement to acquire Canadian shared-browsing technology startup GoInstant. The acquisition will add to a string of purchases by Salesforce.com ...
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cyber criminals with an opportunity to launch attacks in a botnet-like fashion, according to a report from security consultancy ...
Tags: cloud provider, network, security consultancy, BAE System