Search Results

Results 1341-1360 of 1988 for John P. Mello Jr.

Microsoft to Kill the Messenger, Supplant It With Skype

Microsoft will phase out Windows Live Messenger, its consumer instant messaging platform, over the next several months as its users are moved to Skype, the company announced this week ...

SPOTLIGHT ON SECURITY

Study: Google Play Apps Go Beyond Need-to-Know

An analysis of more than 400,000 apps in the Google Play store has revealed that more than 100,000 of them pose a potential security risk to their users ...

Russian Hacker Gets a Taste of His Own Malware

After a persistent series of attacks on its government computers by a Russian hacker, the Republic of Georgia got mad and refused to take it anymore ...

SPOTLIGHT ON SECURITY

Legacy Applications a Threat to Windows 8 Security

Windows 8 finally made it to prime time last week. This version of Microsoft's operating system makes significant improvements in its security stance, said Alex Balan, senior product manager at Bitdefender, but some of them are likely to be undermined by users wedded to old programs ...

SPOTLIGHT ON SECURITY

Bogus Apps Litter Android With Malware

Android is one of the most popular mobile operating systems in the world. As a result, it's also one of the most popular mobile operating systems to be targeted by malware writers ...

MiniFlame Drops Cyberbombs on High-Value Targets

Security researchers have identified a new offshoot of the notorious Flame espionage malware. The malware, called "miniFlame," creates a backdoor in the systems that it infects. That backdoor can then be used by an attacker to gain access an infected machine. The attacker can then write files to the compromised computer, snatch files from it or snap screenshots of its display...

SPOTLIGHT ON SECURITY

Panetta Sounds Clarion Call for Cybersecurity Action

While U.S. Secretary of Defense Leon Panetta did some silicon saber-rattling last week by raising the prospect of a preemptive strike against cyberattacks, he also delivered a wake-up call to Wall Street and Congress about cybersecurity ...

Lytro Gives Photogs Handier Controls, Snappy New Colors

Lytro is giving users of its shoot-now, focus-later digital camera more control over the photos they capture with the innovative snapper ...

SPOTLIGHT ON SECURITY

Big Businesses Walloped With Climbing Cybercrime Costs

Cybercrime costs continued to climb in 2012 according to a report released Monday by the Ponemon Institute ...

2nd-Gen Nest Thermostat Slims Down, Smartens Up

If thermostats were cars, Nest Labs' would be a Cadillac ...

SPOTLIGHT ON SECURITY

Tizzy Over Bank Cyberattacks Unwarranted, Say Researchers

A week-long cyber attack on some of the nation's largest banks last week most likely wasn't the Armageddon headline writers made it out to be ...

Tesla Sings the Body Electric With Solar Supercharger Stations

Electric car maker Tesla Motors on Tuesday introduced a network of solar-powered rapid charging stations for its vehicles beginning with several locations across California ...

SPOTLIGHT ON SECURITY

Feds Back Projects to Bolster Online ID Verification

When Paul Steiner published his 1993 cartoon in The New Yorker with the caption, "On the Internet, no one knows you're a dog," little did he know it would become a mantra among security professionals, especially those concerned about authenticating identities on the Net ...

IT Security Police: ‘Step Away From That IE’

Internet Explorer is too dangerous to use, according to warnings from throngs of security experts, including Germany's Federal Office for Information Security ...

SPOTLIGHT ON SECURITY

Hacker Claims Old-School Tactic Brought GoDaddy to Its Knees

Someone with the Twitter handle @AnonymousOwn3r made a grab for 15 minutes of fame last week by claiming responsibility for taking down the network for Internet's largest registrar, GoDaddy ...

SPOTLIGHT ON SECURITY

ID Theft Gives Apple Another Security Black Eye

Once upon a time, security shiners involving Apple were as rare as Windows Vista lovers, but now it seems that a week doesn't go by without the name of Steve Jobs' baby being dragged through the digital mud ...

BitTorrent Sharers Beware: You Are Being Watched

Swappers using the popular file-sharing protocol BitTorrent are spied on constantly by monitoring services, some of them seeking to identify media pirates, researchers at the University of Birmingham in the United Kingdom reported Tuesday ...

SPOTLIGHT ON SECURITY

Java Patch May Be Just a Finger in the Dam

Oracle acted swiftly last week to close a zero-day vulnerability in its Java technology, but given Java's track record, that patch is just one hit in a long game of wackamole played with hackers ...

Firefox 15 Goes on a Memory Diet

Better management of memory and updates highlight the latest release of the Mozilla Foundation's Web browser, Firefox 15 ...

SPOTLIGHT ON SECURITY

Security Sleuths Lay Blame on Apple for SMS Vulnerability

Research released last week fingered the iPhone as the source of a text messaging exploit that could be used to steal sensitive information from smartphone users or work mischief on their hardware ...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

CRM Buyer Channels