The performance of the mobile phone is more and more strong, more and more rich, many things can be compared with the current PC, which is caused by the current mobile phone Trojans, phishing sites and more virus, so many people are in the ...
Tags: mobile phone, anti-virus software, mobile phone system
In the beginning of the computer, for me, the best odd and beautiful than the lower right corner of the computer QQ beep and on the right side of the small lion purring, I thought the little lion is very cute, but love to sleep! After I ...
Tags: the computer, Rising antivirus software, 360
D-Link has cooperated with China-based information security software solution provider Qihoo 360 Technology to launch a smart WLAN router, the D-Link 360Mini, for co-branded sale in the China market, according to D-Link. D-Link 360Mini is ...
Tags: D-Link, WLAN Router, Smart Router
Yahoo, has acknowledged that its service sites were used by hackers to enslave massive numbers of ordinary PCs who did so to generate bitcoins, and by extension, real earnings. Ads were placed on Yahoo web sites that when clicked by users, ...
Security vendor Symantec has discovered a Linux worm called Linux.Darlloz that has been engineered to exploit a known bug in PHP (php-cgi Information Disclosure Vulnerability) that was patched last year. Vulnerable devices include unpatched ...
Tags: Computer Products, software
The cyber-extortionists behind the Cryptolocker "ransomware", which encrypts users' files and refuses to decrypt them without payment, have extended their deadline for affect PC users. Cryptolocker uses 256-bit Advanced Encryption ...
Tags: Computer Products, web surcrity
Critical vulnerabilities in SAProuter, the SAP module used to connect users of the enterprise resource planning (ERP) software with SAP's update services, could be compromising their security, according to Alexander Polyakov, chief ...
Tags: Computer Products, software
Security expert and reformed hacker Kevin Mitnick has branded anti-virus software useless, claiming: "The only thing McAfee is good at is making videos." Further reading Not enough cyber warriors to fight computer hackers, says former ...
Tags: Computer Products, software, hacker
Kaspersky has discovered 'Icefog', a hacking campaign that targets the supply chains of Western companies, a report by the security and anti-virus software solutions provider has revealed, as it warns about the growing threat of ...
Tags: Kaspersky, software, Computer Products
Several online businesses have clarified terms and conditions that could mislead consumers about their rights following action by the Australian Competition and Consumer Commission. Last September, the ACCC joined international consumer ...
Tags: ACCC, Online Shopping, Shopping
Network World - Like it or not, IT departments are accepting the fact that employees are bringing smartphones, tablets, and personal laptops to work and that they will use these devices while on the job. To cope with this reality, savvy ...
Tags: Fortune 500, BYOD
Governments routinely use the internet to spy on people and organisations, and to steal sensitive and classified information - and we'd all better get used to it. That is the message from Chinese' networking company Huawei's head of ...
Tags: Computer Products, software
The computer virus seems to be making a subtle comeback. The term virus is frequently used as a catch-all for malicious software, but actually describes a very specific type of program that infects files and replicates, noticeable ...
Tags: Computer Products, software
Several media outlets in the Washington DC area have had their websites hacked and used to spread malware. WTOP, the largest radio station in the region, and Federal News Radio, along with the website of technology blogger John Dvorak ...
Tags: Media Websites, Cyber Attacks
The Reserve Bank of Australia's computer systems have fallen victim to cyber hacking in at least two highly sophisticated online attacks. Documents released by the RBA show that the central bank was the victim of a "highly targeted" email ...
Tags: Hackers, RBA computers, malicious software