As anticipated, the latest round of Microsoft’s Patch Tuesday monthly release of security fixes addresses a widely known Internet Explorer (IE) vulnerability already being exploited by malicious hackers. Overall, for October’s ...
Network Solutions is investigating an attack by a pro-Palestinian hacking group that redirected websites belonging to several companies. Owned by Web.com, Network Solutions registers domain names, provides hosting services and sells other ...
Tags: DNS Hijack, Network Solutions
Google chairman Eric Schmidt has claimed that Android smartphones have better security than that of Apple's iPhone. Schmidt made the statement at Gartner Symposium/ITxpo in Orlando, Florida during a question and answer session following a ...
Tags: Computer Products, Google
Kaspersky has discovered 'Icefog', a hacking campaign that targets the supply chains of Western companies, a report by the security and anti-virus software solutions provider has revealed, as it warns about the growing threat of ...
Tags: Kaspersky, software, Computer Products
The Foreign & Commonwealth Office (FCO) has selected BAE Systems Detica to manage its global IT estate for the next five years. The £40m deal will see BAE Systems Detica take responsibility for Service Management Integration for the ...
Tags: Computer Products, software
NliteN has just added the dimmable 2D-Lux™ Smart LED Disk (SLEDD) to its campaign on Indiegogo. The 2D-Lux SLEDD, a 60W-incandescent-replacement LED smart "bulb", adds an Atmel AVR microcontroller, USB interface, and ...
Tags: Smart LED Disk, Lighting
German hackers claim to have breached the Apple iPhone 5S's fingerprint security. In a post on its website, German group Chaos Computer Club (CCC) describes how members of its biometric hacking team were apparently able to take a photo of ...
Tags: Apple Iphone, Computer Products
IT services provider NG Baily will continue to manage Ministry of Defence (MoD) voice and data networks after being awarded an extension to its contract by BT. The extended contract will see NG Baily responsible for taking care of ...
Tags: IT services, Computer Products
A majority of U.S. Internet users polled in a recent survey report taking steps to remove or mask their digital footprints online, according to a report from the Pew Research Center’s Internet Project and Carnegie Mellon University. ...
Tags: Avoid Surveillance, Internet Users
While filing cabinets probably won't be the most glamorous thing you've ever shopped for, they can be the most important for protecting valuable company records, especially if you decide to invest in fireproof filing cabinets. While the ...
Tags: Filing Cabinets, Furniture, Furnishing
The New York Times blamed a prolonged website outage on Tuesday on a hacking attack at the company's Australia-based domain name registrar, Melbourne IT. A story published by The Times on Tuesday afternoon quoted the company's CIO, Marc ...
Tags: Computer Products, IT
Cyber security solutions provider Becrypt and military-specified laptop and tablet manufacturer Getac have joined forces to develop an Android tablet solution for military, defence and the government. The vendors claim that the solution ...
Tags: Computer Products, webservice
A malicious software tool perhaps most famously used to hack RSA's SecurID infrastructure is still being used in targeted attacks, according to security vendor FireEye. Poison Ivy is a remote access trojan (RAT) that was released eight ...
Tags: Computer Products, software
A widely used Bitcoin wallet service plans to issue refunds to people who saw their bitcoins stolen as a result of a weakness in its application. Blockchain.info, which has a Web-based service called My Wallet, has also upgraded its ...
Tags: Computer Products, software, Bitcoin Wallet Service, webservice
If US intelligence agencies ban the computers of a Chinese company from classified networks should companies also avoid the same products? What if the vendor is one of the world’s largest PC makers? Those questions are not academic. ...
Tags: China-Based Lenovo