News

Apple computers vulnerable to 'Thunderstrike 2' firmware worm

The improved attack highlights ongoing concerns over the security of a computer's low-level code

Apple falls to third in China smartphone rankings, while Xiaomi vaults ahead

Xiaomi led the market, while Huawei came in second


Cleaning up botnets takes years, if ever, to complete

The cleanup effort around Conficker shows how hard it is to eradicate a botnet

Yahoo tackles large 'malvertising' campaign in its ad network

Ads with malicious code may have appeared across Yahoo's sites

OneDrive finally lets you sync shared folders

Microsoft's cloud storage service now lets users automatically sync items in folders shared with others

Condé Nast parent company jumps into big data market with 1010data purchase

Advance has bought the big data services provider for $500 million, and plans to inject capital into it so it can expand its operations

campus technology harvard ciso christian hamer

Harvard CISO shares 5 pearls of IT security wisdom

Harvard University Chief Information Security Officer shares best practices, discusses BYOD and Internet of Things.

Counterterrorism expert says it's time to give companies offensive cybercapabilities

The U.S. government should arm private businesses with cyberwarrants, allowing them to hack back

win10 blacked out

Beware this Windows 10 upgrade scam

A new email scam uses Windows 10's arrival to install ransomware on your computer

malware keyboard skull and crossbones

Newest RIG exploit kit driven by malicious advertising

Earlier this year, a disgruntled reseller leaked the source code for version 2.0 of the RIG exploit kit. Since then, the RIG's author has released a new version, which was recently discovered by researchers from Trustwave. The latest...

webdriver and edge

Microsoft: Automate Edge through WebDriver

Find out how to use Webdriver to automate Microsoft's Edge browser.

IBM applies some engineering rigor to the Internet of Things

The company says the practice of product line engineering will help IoT manufacturers maintain their portfolios

cloud apps

Government CIOs fret over application reliability in the cloud

Government officials cite security and user experience as top concerns in delivering apps in a cloud setting and pushing out online citizen services.

Microsoft buys sales-gamification startup with eye to CRM combo

Incent Games' software will be integrated into Microsoft's Dynamics CRM offering

Ubuntu 15.10: Wily Werewolf alpha 2 released

In today's open source roundup: Alpha 2 of Ubuntu 15.10 has been released. Plus: Kodi 15 media player released for Android. And Windows 10 versus Linux.

1 title

Social Engineering: 6 commonly targeted data points that are poorly protected

Now in its sixth year, the Social Engineering village at DEF CON has always been an interesting location. Each year the village hosts talks and interactive lessons on human hacking, but the major draw is the Social Engineering Capture...

The Upload: Your tech news briefing for Monday, Aug. 3

Robot hitchiker attacked, abandoned... Nokia sells Here mapping business to German car makers... Spy-spotting software comes to Wall St

China clamps down on exports of drones and supercomputers

The export controls will come into effect on Aug. 15

rooftop solar installation 100572696 primary.idge 100590095 primary.idge

Clinton plan to power U.S. homes with renewable energy in 10 years is doable

Hillary Clinton said last week that if elected president, she would push plans to get every household in America powered by renewable energy by 2027. While an "aggressive goal," the plan is not unrealistic. But that are major...

Airbnb thief

Airbnb guest suspected of stealing $35k from San Francisco home

Incident highlights risks of renting out homes through online sites

Load More