Yahoo said that malware spread by advertisements served by its European websites had not affected users in North America, Asia Pacific and Latin America as people in these locations did not receive them. In addition, users using ...
Tags: Mac, Mobile Users
We were already aware of the existence of illicit marketplaces teeming with tools for cybercriminals looking to subvert the security of online networks. But one of the latest revelations from the cache of documents stolen by NSA ...
Tags: cybercriminals, security of online networks, Edward Snowden, NSA
From drones and smart cars to remote-controlled door locks and eyewear, the 2014 Consumer Electronics Show promises to showcase the "Internet of Things," along with gadgets like smartphones and tablets. The technology extravaganza that ...
The technology news blog AllThingsD has relaunched under the name Re/code under a partnership with NBCUniversal, after splitting with News Corp's Wall Street Journal. Re/code is a "media news, reviews and analysis site launching today, ...
Tags: AllThingsD, technology news blog, Re/code, NBCUniversal
This week’s edition of IT hiccups, snarls, and general foul-ups begins with the surprising announcement last Thursday by U.S. District Judge James V. Selna who, according to Bloomberg News, issued an order stopping lawsuits into ...
For safe and healthy living, it is important to stay in a safe and pollution free environment. But in present era, it is quite difficult to control the whole environment because not only outdoor air is polluted but also the indoor air ...
Verizon has signed an agreement to acquire EdgeCast Networks, in an effort to enhance its video delivery and Web services capabilities. The growth of online video, both in fixed and mobile networks has made content delivery networks such ...
Tags: Verizon, EdgeCast, network, mobile networks, Web service, online video
On any given day cybercriminals and nation states are in possession of as many as 100 zero-day software exploits known only to them, NSS Labs has calculated using the commercial vulnerability market as a baseline. NSS Labs research ...
Tags: Computer Products, software
Eight top tech companies in the U.S. have asked governments around the world to reform surveillance laws and practices, and asked the U.S. to take the lead. AOL, Apple, Facebook, Google, LinkedIn, Twitter, Yahoo and Microsoft said Monday ...
Tumblr is where the Internet's cool kids hang out. That's why Yahoo paid $1.1 billion to buy the blogging site in one of this year's most buzzed-about deals. Now, Tumblr is flaunting its hipster credentials with a first-ever breakdown of ...
Tags: Tumblr, Hipster Twist
Microsoft is planning end-to-end encryption of its internet traffic following concerns that the company had its network security breached as part of the National Security Agency's (NSA) internet surveillance programme. The revelation, ...
Tags: Microsoft, ramp up, encryption, combat, NSA, surveillance
Microsoft has announced that it will introduce message encryption for its cloud-based Office 365 service in early 2014. Dubbed Office 365 Message Encryption, the system will automatically encrypt email to anyone outside a company ...
Tags: Computer Products, software, Office 365, Microsoft
A word of warning to local chambers of commerce, Rotary Clubs, United Ways and other groups and organizations that care about and work on behalf of local communities: Internet pureplays are stealing money from your city’s coffers. ...
Tags: Local Media, Local Businesses
SAN JOSE, Calif. (AP) -- Back when Yahoo was something hollered at a rodeo and no one could conceive of Googling anything, President Ronald Reagan signed an executive order that extended the power of U.S. intelligence agencies overseas, ...
Tags: Reagan, NSA, Google and Yahoo
SAN FRANCISCO (AP) -- Yahoo is expanding its efforts to protect its users' online activities from prying eyes by encrypting all the communications and other information flowing into the Internet company's data centers around the world. ...
Tags: Yahoo, Encrypt, Users'Personal Data