Microsoft today said that attackers are exploiting a critical and unpatched vulnerability in Office 2007 using malformed documents to hijack Windows PCs, and that Office 2003 and Office 2010 are also vulnerable. The bug can be triggered ...
Tags: Microsoft, software, Computer Products
The Information Commissioner's Office has doled out its latest data breach fine, this time to the Ministry of Justice, to the tune of £140,000. The ICO identified a "serious data breach", which saw details of all 1,182 prisoners ...
Tags: Computer Products, software
Consumers and small businesses will be allowed to cancel their mobile, broadband and landline contracts if they are subjected to price increases on a fixed-term contract, under new guidance set out by communications regulator Ofcom. Ofcom ...
Tags: Computer Products, software
In both iOS 4 and iOS 5, Apple gave the Mail app major overhauls. Even in iOS 6, Mail gained some significant new features. This time around, in iOS 7′s version of Mail, the biggest changes are to the look-and-feel, thanks to the ...
Tags: Apple, iOS 7 Mail
If you just picked up your iPhone 5s, you may be itching to record some slow-motion video. (I know I was.) But due to the way Apple’s slow-motion feature is implemented, sharing your brilliance with the world may take a few extra ...
A malicious software tool perhaps most famously used to hack RSA's SecurID infrastructure is still being used in targeted attacks, according to security vendor FireEye. Poison Ivy is a remote access trojan (RAT) that was released eight ...
Tags: Computer Products, software
IDG News Service - The two biggest mobile operators in the U.S. are fiercely competitive and closely matched in size. So will AT&T's proposed multibillion-dollar acquisition of Leap Wireless change the balance? Market figures and ...
Tags: Computer Products, software
Armstrong World Industries won two Web Marketing Association 2013 Internet Advertising Competition(IAC)awards:Best Manufacturing Email Message Campaign and Best Manufacturing Social Media Campaign.Both campaigns were elements of the 2nd ...
Tags: IAC, Awards, Online Advertising, Armstrong
Domain registrar Name.com forced its customers to reset their account passwords on Wednesday following a security breach on the company's servers that might have resulted in customer information being compromised. Hackers might have ...
Tags: Computer Products, Passwords
As developers create tiny computer devices like smartwatches, one question they face is how to make tiny keyboards usable. Researchers at Carnegie Mellon University say they have a solution to that problem. They have developed what's ...
Tags: Smartwatches, Zoomable Display
CQuotient unveiled its new technology that enables retailers to send highly relevant digital communications to individual customers. By using the most advanced machine learning and predictive algorithms, CQuotient’s technology ...
Twitter has implemented DMARC, a standard for preventing email spoofing, in order to make it harder for attackers to send phishing emails that appear to come from twitter.com addresses. Twitter users are constantly targeted in phishing ...
Tags: Twitter, DMARC, company news
Oracle has sold assets related to the Lustre parallel distributed file system to high-performance computing storage vendor Xyratex, which has pledged to lead further development of the software in its current collaborative open-source ...
A recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and is probably part of an important cyberespionage operation, the head of the malware analysis team at ...
Tags: Adobe Reader, anti-exploitation protection, Adobe Reader Sandbox
The head of the malware analysis team at antivirus vendor Kaspersky said last week that a recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and probably part of ...