Today marks publication of the 600th Whitelist blog post by email marketing vendor ClickMail Marketing. ClickMail's Whitelist is a popular email marketing blog covering topics ranging from email design to mobile marketing and much more. ...
Tags: ClickMail Marketing, Whitelist blog, email marketing blog
Millions of subscribers to Virgin Mobile's services in the United States are wide open to account hijacking because of the insecure manner in which the company authenticates users to their online accounts, an independent software developer ...
Tags: subscribers, Virgin Mobile's services, account hijacking, online accounts
SMARTPHONE photo sharing service Instagram has refined its privacy policy to clear the way for sharing data with Facebook, which bought the company earlier this year. "Nothing has changed about your photos' ownership or who can see them," ...
Tags: Instagram, Facebook, Data, Computer Products
VMware has continued its shopping spree by buying big data analytics tool Log Insight in order to expand its cloud and virtualisation portfolio in its battle against Amazon and Rackspace. The move follows the acquisitions of cloud ...
Tags: VMware, data analytics tool, Log Insight, cloud, virtualisation portfolio
Amazon is making it easier for developers in some European countries to get paid for selling their apps on the Amazon Appstore, the company said in a blog post on Wednesday. Developers will now have payments electronically transferred to ...
Tags: Amazon, developers, European countries, apps
Foursquare has expanded its recommendation capabilities by including suggestions from Facebook friends. The new feature aims for users to see more personal information about places they want to go. "The best recommendations often come ...
Tags: Foursquare, recommendation capabilities, Facebook, suggestions
The online accounts of Virgin Mobile USA subscribers are vulnerable to brute force attacks because the company forces customers to use weak passwords on its website, according to a software developer. "Virgin Mobile forces you to use your ...
Tags: Virgin Mobile, USA subscribers, force attacks, weak passwords
Researchers from security vendor Damballa have identified malicious Internet traffic that they believe is generated by a new and elusive variant of the sophisticated TDL4 malware. The new threat, which has been assigned the generic name ...
Tags: TDL4 malware, Internet traffic, elusive variant, Fortune 500 Companies
IDG News Service - A new piece of malware that deletes entire partitions and user files from infected computers has been found in Iran, according to an alert issued Sunday by Maher, Iran's Computer Emergency Response Team Coordination ...
Tags: malware, deletes entire partitions, deletes user files, CERTCC
Attackers can abuse Facebook's phone search feature to find valid phone numbers and the names of their owners, according to security researchers. The attack is possible because Facebook doesn't limit the number of phone number searches ...
Tags: Facebook, phone search feature, valid phone numbers, security researchers
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for ...
Tags: Digital Bond, Flaw, patch, vulnerability, control systems
Over half of Android devices are vulnerable to known security flaws that can be exploited by malicious applications to gain complete access to the operating system and the data stored on it, according to a report from mobile security firm ...
Tags: Android, applications, critical, devices, vulnerabilities
Google+ first went live at the end of June, 2011, Brandlective Communications began testing the social network almost immediately and within two weeks of its launch, the International Business Times had reported that the popularity rise of ...
Tags: Google+, social network, social media network, company news
Security researchers have uncovered a highly sophisticated, multi-tiered, global financial fraud ring that has attempted fraudulent transfers of up to 1.6bn from at least 60 banks This fraud empire, discovered by researchers from security ...
Tags: financial fraud, security, banking system, financial security
Amazon has introduced a computer cluster at its facility in Ireland to support European high-performance computing applications in the Amazon cloud. The Cluster Compute Eight Extra Large (cc2.8xl) instance includes a pair of Intel Xeon ...
Tags: computer cluster, computing application, instance storage