Java's new security settings, designed to block "drive-by" browser attacks, can be bypassed by hackers, a researcher announced Sunday. The news came in the aftermath of several embarrassing "zero-day" vulnerabilities, and a recent ...
Tags: Bug, Moot Java, Anti-Exploit Defense
The Information Commissioner’s Office (ICO) found that Sony could have prevented being hacked in April 2011. Sony's April 2011 hack of its PlayStation platform saw the personal data of millions of customers put at risk. ...
Tags: Sony, PlayStation platform, software
UnlockUnit.com is a premium company in the area of cellphone unlocking services, providing its customers with safe, fast and secure unlocking solutions. With the promise of a fast delivery, best prices and great customer support, ...
Tags: UnlockUnit, cellphone unlocking services, unlocking solutions
Representatives of newly launched file-storage and sharing service Mega addressed some of the concerns raised by security researchers in recent days about the site's architecture and the implementation of its cryptographic features. In a ...
Tags: file-storage, sharing service, Mega
Former Apple CEO Steve Jobs threatened Palm with a patent lawsuit if it did not enter into an agreement in which the companies pledged not to hire employees from each other, unsealed court documents show. Jobs threatened Palm with ...
Tags: Apple, patent lawsuit, company news
Access to software collaboration site GitHub appeared to be restored in China on Wednesday, just as former Google executive Kai-Fu lee criticized its blocking as a senseless move that would harm the nation's developers. GitHub, a U.S. ...
Tags: software collaboration, GitHub, China
With the latest generation of high-end smartphones sporting power-hungry 5-inch screens, a growing number of phone vendors are emphasizing bigger batteries rather than thinner devices. After HTC's introduction of a 5-inch, full-HD screen ...
Tags: smartphone, screen, phone market
Google, AT&T and Verizon Communications were among the top corporate spenders on lobbying the U.S. government in the fourth quarter of 2012, according to information released this week by the U.S. House of Representatives. In some other ...
Tags: Google, AT&T, Verizon Communications, tech, telecom
Analysts are unsure whether RIM's new enterprise mobility software, now available for download, can halt the migration away from BlackBerry smartphones. The new BES 10 tool set combines security, device and application management for ...
Sony has received a record £250,000 fine from the Information Commissioner's Office (ICO) as punishment for the PlayStation Network (PSN) hack that took place in April 2011. The electronics firm says it "strongly disagrees" with the ...
Tags: Sony, Information Commissioner's Office, PlayStation Network
The likes of Samsung, Apple, Nokia and RIM should be wary of firms that hold patents on technologies designed to exploit the use of 4G speeds, a lawyer has warned. John-Paul Rooney (pictured), partner and patent attorney at intellectual ...
Tags: 4G speeds, 4G mobile service, 4G netork
Electronics giant Sony has been fined by Britain's data watchdog for a breach that compromised the personal information of millions of customers using PlayStation video games consoles. The Information Commissioner's Office (ICO) in the UK ...
Tags: Sony, cyberattack, Computer
The Houston to Nederland, Texas, segment of Shell Pipeline's Houston to Houma, Louisiana, crude pipeline reversal project is open for shippers, a company spokeswoman said Wednesday. "The reversal is progressing on schedule, and the ...
Tags: Shell Pipeline, crude pipeline reversal project, crude
When Canonical officially announced Ubuntu for phones just a few weeks ago, it demonstrated an attractive interface but was otherwise light on specifics regarding the hardware, carriers, or apps that might be involved in actual devices. A ...
Using a long phrase or a short sentence as a password may not be as secure as some security experts think. Researchers at Carnegie Mellon University's Institute for Software Research have found that long passwords that incorporate grammar ...
Tags: Password, incorporate grammar, security