Microsoft today said it will issue 12 security updates next week, including two for Internet Explorer (IE), that will patch a near-record 57 vulnerabilities in the browser, Windows, Office and the enterprise-critical Exchange Server email ...
Tags: Microsoft, security updates, email software
Facebook has deleted all European facial recognition data, the Irish data protection commissioner and a German data protection regulator confirmed independently Thursday after reviewing parts of the social network's source code. "We ...
Tags: Facebook, data protection, social network
Microsoft has launched a campaign in the U.S. that targets Google's alleged practice of going through the contents of all Gmail messages to sell and target advertisements, raising again an old issue the software giant has with the free ...
Tags: Microsoft, Google, Gmail messages
The Mega file-sharing service has launched a vulnerability reward program that will pay up to 10,000 euros (around $13,600) for every serious security flaw found in the platform and reported responsibly. The rules of the program were laid ...
Tags: Mega, file-sharing service, vulnerability reward program
Dell's buyout deal should give the company renewed business flexibility and stealth, but its customers need to know if Dell will be in the PC market for the long haul. "Now, Dell will be able to better compete with HP, Lenovo, IBM and ...
Tags: Dell, buyout deal, business flexibility
A faulty antivirus update issued by Kaspersky Lab on Monday left many of its home and business customers unable to access any websites on their computers. Systems administrators using Kaspersky Endpoint Security (KES) on their corporate ...
The second draft of the controversial Communications Data Bill, which aims to allow unparalleled interception of data about UK citizens' online communications and voice calls, is to be released next month. Government publishes draft ...
Private clouds are now a better option for secure and manageable data retention than in-house storage. That's according to Jayson Dudley, group insfrastructure manager at accountancy firm Mazars. "It seems a mismatch in someone's ...
Tags: private clouds, manageable data retention, insfrastructure
New software capable of dredging social media websites, mining people's social networks and "predicting their behaviour", has been developed by defence contractor Raytheon. The software, called Rapid Information Overlay Technology (RIOT), ...
Apple is testing designs for a watch capable of operating as a smartphone-like device, according to people claiming inside knowledge on the matter. Both The Wall Street Journal and The New York Times cite sources that say Apple is ...
Tags: Apple, watch, smartphone-like device
Children as young as 11 years old are developing malicious code to steal personal information from online gamers, according to antivirus software provider AVG. The Q4 2012 Community Powered Threat Report reveals some schoolchildren have ...
Tags: AVG, malicious code, cyber security
If you are a retailer or brand and deal in the hectic world of Product Development you might be battling overdue shipments, quality issues and rising costs. If so, its' time to evaluate PLM. If you can relate to any of the 7 signs below, ...
Tags: Fashion PLM, shipments, quality issues, rising costs
Microsoft is pulling no punches with a new promotional campaign for its revamped Outlook email service, as it directly accuses Google of "invasion of your privacy" and "going through mail to sell ads". The campaign - which Microsoft calls ...
Tags: Microsoft, promotional campaign, Outlook email service
Adobe has released an emergency patch to fix at least two zero-day vulnerabilities being used to install malware in its Flash Player software that could allow attackers to control affected systems. Hackers had exploited security loopholes ...
US President Barack Obama has finally signed a much-anticipated executive order to protect key elements of the country's critical infrastructure against cyberattacks. Covering power plants, water utilities and other high-profile targets, ...
Tags: cyberattacks, infrastructure, Barack Obama