Security

Burglars Could Exploit Social Networking Sites

Social networkers using sites like Facebook or Twitter may be leaving themselves open to burglery due to the personal information…

15 years ago

US Credit Card Hacker Pleads Guilty

Notorious hacker Albert Gonzalez agrees to plead guilty to having a role in the theft of data from millions of…

15 years ago

Government Touts Smart Tickets – Then Warns Over Crime

The Home Office has said it is working with mobile and banking experts to minimise the emergence of new types…

15 years ago

Facebook Tightens Privacy Controls

The social network also promises to include the reasons for collecting date of birth information as well as information on…

15 years ago

Twitter Still Open To Security Exploit Warns Developer

A cross-site scripting vulnerability affecting Twitter security is still open despite the microblogging service's attempt at a fix, a software…

15 years ago

Another BitTorrent Site Faces Legal Action

Mininova, an alternative to BitTorrent tracking site The Pirate Bay, loses a key legal battle as a Dutch court rules…

15 years ago

Government File-Sharing Move Could Cut Off Entire Households

The UK government has taken Internet copyright-protection out of Ofcom's hands, and is rushing through measures that could cut off…

15 years ago

Massive Attack Infects 57,000 Sites

China is the likely source - but also a victim of the Trojan campaign which installs malware on visitors PCs

15 years ago

Ten Microsoft Windows 7 Features We Want

Windows 7 is faster and easier than Windows Vista, has some good user interface tweaks - and it has crazy…

15 years ago

Internet Explorer 8 – More Secure Than Firefox And Chrome?

Microsoft may get criticised for security issues, but IE8 just came top in a security study, beating Firefox, Chrome, Safari…

15 years ago

Email Bug Reported In iPhone 3.0

An apparent bug in Apple's iPhone OS 3.0 software allows users to find e-mails even after they have been deleted…

15 years ago

Radisson Admits To Unwelcome Guests In IT Systems

Federal authorities are investigating a report from the Radisson hotel chain that someone illegally accessed its computer systems

15 years ago

Here Is A Gaping Windows 7 Hole!

While testing Windows 7 for eWEEK, Andrew Garcia found something nasty: in certain circumstances, Windows 7 provides anyone with an…

15 years ago

Windows 7 RTM Review: Improvements But Security Issues Remain

The RTM version of Windows 7 has plenty of improvements, according to our long review. But Andrew Garcia has concerns…

15 years ago

International Body Needed To Tackle Political Hacking

The cyber-attacks against Georgia launched by Russian hackers in 2008 demonstrate the need for international cooperation for security, according to…

15 years ago

Analyst: Palm Should Have Highlighted Data Policy

Some users were surprised to discover that the Palm Pre collects information about their mobile phone use and their whereabouts.…

15 years ago

Government Calls on Technologists To Combat Terrorism

Growing cyber-threats results in call for ideas and expertise to help security forces keep pace

15 years ago

Palm Responds To Monitoring Complaint

Palm issues a statement in the wake of complaints stemming from the Pre smartphone's habit of sending users' data back…

15 years ago

UK Pirate Party Focused On General Election

The UK now has its own anti-patent and pro-file-sharing party which has its sights set on Parliamentary seats

15 years ago

Hope For Hacker McKinnon After US Asperger’s Ruling

Slightly reduced sentence for autism sufferer could similarly benefit British hacker

15 years ago

Apple Issues Another Security Update

Apple issues an update to fix a bug affecting Mac OS X, including server editions. The patch comes shortly after…

15 years ago

Security Researchers Harness 1 Million Linux Virtual Machines

Scientists at Sandia National Laboratories have demonstrated the ability to run more than 1 million Linux kernels as virtual machines,…

15 years ago

Biometrics Aimed At Windows 7 Netbooks

Authentec, like competitor Upek, is thinking of new ways to revive the authentication market

15 years ago

Toughbooks Get Tougher Says Panasonic

The Panasonic Toughbook 19, Toughbook 30 and Toughbook U1 mobile computers now meet more demanding military specifications for drops, vibration…

15 years ago

Twitter Hit By Another DDOS Attack

Twitter experiences another distributed-denial-of-service attack, knocking out the microblogging service for a time

15 years ago

US Bank Allows Cheques To Be Uploaded By iPhone

USAA, a private bank and insurer in the US, is updating its Apple iPhone app so account holders can simply…

15 years ago

IT Vendors Increasingly Liable For Product Failures By 2015

Increasing reliance on IT systems combined with concern about their effectiveness could force governments to more tightly regulate the sector…

15 years ago

UK Forces Encouraged To Use Facebook, Youtube

Military authorities have outlined how service personnel should use social networks while the US appears to have taken a stricter…

15 years ago

Hackers Exploit Fallout From Twitter DDOS Attack

The fallout from the DDOS attack that hit Twitter, Facebook, YouTube and other Web 2.0 sites continued even after the…

15 years ago

Is Apple’s Security Reputation Under Threat?

Is it finally time for the company to admit that its operating system is as susceptible to security issues as…

15 years ago