Search Results

Results 1361-1380 of 1981 for John P. Mello Jr.

Facebook’s Gloomy Quarter Blamed on Big Fat Mobile Problem

Facebook on Thursday released its first quarterly earnings report since its monster IPO in May ...

SPOTLIGHT ON SECURITY

The Case Of The Android Botnet

Microsoft security researcher Terry Zink pulled the pin on a virtual grenade when he aired his belief that he'd discovered a botnet manned by Android zombies ...

Microsoft’s EU Browser Bugaboo Could Cost Billions

A technical error that affected 28 million Windows users in Europe could cost Microsoft billions in penalties ...

SPOTLIGHT ON SECURITY

DNSChanger: Just a Dress Rehearsal

Despite dire warnings, the Internet didn't break last week when the FBI pulled the plug on the server controlling the DNSChanger botnet ...

Ballmer Pokes Apple to Stoke Microsoft’s Fire

To listen to Microsoft's Steve Ballmer talk, you'd think he was the prime minister of a besieged nation, rather than the captain of one of the largest software companies in the world ...

SPOTLIGHT ON SECURITY

Stuxnet Is Dead, Long Live Stuxnet

Those who follow the exploits of Stuxnet will remember June 24, 2012, as Big Sleep day for the infamous malware. On that day, it stopped replicating ...

SPOTLIGHT ON SECURITY

RSA Encryption ‘Crack’ Rattles Infosec Industry

Claims by a team of international cyrptographic researchers that they've "cracked" the RSA encryption used on a number of smartcards and secure tokens has set off a tempest in security circles ...

Zynga Pulls Out the Glue Gun

Zynga made a number of announcements at its Unleashed event in San Francisco Tuesday, most of them aimed at the same goal: making its services "stickier" to its players ...

SPOTLIGHT ON SECURITY

Watchdogs Get a Whiff of Google’s Government Privacy Policy

There's evidence that Google's consumer privacy policy is being extended to government contracts for its software services, according to SafeGov.org. ...

Asus Cross-Breeds Phone, Tablet and Notebook to Create PadFone

After several missed deadlines, Asus has finally introduced a combination smartphone, tablet and notebook computer aimed at consumers who are tired of toting around disparate devices ...

SPOTLIGHT ON SECURITY

Spam Flies Fast and Furious in the Wake of the LinkedIn Breach

The deluge of spam dropped on members of LinkedIn last week perhaps could have been expected after a data breach at the site exposed 6.5 million of their passwords. Those messages, though, are more likely to harm members unaffected by the breach than those victimized by it ...

SPOTLIGHT ON SECURITY

Flame Is No Stuxnet

Fanned by a security community hungry for the next Stuxnet, a new so-called superworm called "Flame" made headlines last week ...

SPOTLIGHT ON SECURITY

DCAC: A Field Day for the Heat

"Domestic Communications Assistance Center" is the kind of name you'd give to a couples counseling collective. At the FBI, though, it's the name that's been given to an agency designed to be at the cutting edge of digital snooping ...

Under Google’s Wing, Motorola Can Stop Dabbling

Motorola Mobility's financial performance has been less than stellar in the last three years, so its acquisition by Google for US$12.5 billion could be a boon for the company ...

SPOTLIGHT ON SECURITY

Information Highwaymen Will Follow the Cybermoney

An FBI report about Bitcoin leaked to a number of online media outlets earlier this month may have caused anxiety in some corners of the Internet, but not for one developer of the decentralized digital currency ...

SPOTLIGHT ON SECURITY

FBI Sounds Alarm on Hotel WiFi Caper

The U.S. Federal Bureau of Investigation has warned overseas travelersto be careful when using hotel WiFi networks ...

DHS Sounds Alarm on Gas Line Cyberthreat

For months, the nation's natural gas pipeline industry has been under persistent cyberattack from unknown parties, the U.S. Department of Homeland Security (DHS) revealed this week ...

SPOTLIGHT ON SECURITY

The Malicious Hacker’s Ever-Sharper Eye

Targeted attacks on organizations and Web-born infections like the recent Flashback outbreak on Macintosh computers will continue to poison the security landscape in 2012, according to John Harrison, Symantec group product manager for endpoint threat protection and security technology and response ...

SPOTLIGHT ON SECURITY

What Evil Lurks in the Hearts of Hactivists?

Nearly two-thirds (64 percent) of IT pros believe their organizations will be the target of a cyberattack in the next six months, and three out of five (61 percent) say the attack will come from hactivists ...

SPOTLIGHT ON SECURITY

Did Google’s Wardriving Ways Give It a Competitive Edge?

Last week, the U.S. Federal Communications Commission (FCC) let Google off with a tap on the wrist for hindering the commission's efforts to investigate allegations that Google was slurping information from WiFi networks with its fleet of mapping vehicles. [*Correction - April 23, 2012] ...

CRM Buyer Channels