271 News Story Topics

Remove Filter
Member Avatar for
Member Avatar for Techwriter10

Imagine my surprise when I learned this morning that an [URL="http://news.cnet.com/8301-13924_3-10216733-64.html?part=rss&subj=news&tag=2547-1_3-0-5"]IBM researcher believes[/URL] that Moore's Law-- that the number of transistors on a micro processor would double nearly every two years-- could be nearing the end of its run. Amazingly Moore made this prediction in 1965 and his law has …

Member Avatar for Madisson
1
527
Member Avatar for happygeek

[URL="http://www.ibm.com"]IBM[/URL] researchers have [URL="http://www.zurich.ibm.com/news/07/asme.html"]unveiled[/URL] prototype 3D visualisation software that will enable doctors to interact with their medical data in pretty much the same way they interact with their patients. The technology, known as the Anatomic and Symbolic Mapper Engine (ASME), uses an avatar representation of the human body which the …

Member Avatar for Jose_52
1
698
Member Avatar for Taufik R

Many aspiring entrepreneurs want to start their business online but quite a few of this lot actually succeeds in turning their awesome application idea into reality. The question arises, what to do with a crazy app idea? Generally, businesses having their own mobile apps, ensure a strong connection with their …

-1
574
Member Avatar for happygeek

Last week a group of six 'm-commerce' experts took part in a round robin discussion in Manchester, England to determine the best ways forward for developers interested in creating a serious mobile web presence yet wanting to make money through the medium of mobile advertising at the same time. Anyone …

Member Avatar for Anninflow
0
4K
Member Avatar for happygeek

The second annual Imperva Hacker Intelligence Initiative report, this one entitled [Monitoring Hacker Forums](http://www.imperva.com/docs/HII_Monitoring_Hacker_Forums_2012.pdf), is out and reveals that the threat surfaces being discussed by the hacker community are very different from those that businesses are spending money on defending against attack. ![dweb-hackers](/attachments/small/0/dweb-hackers.jpg "align-right") The Imperva research analysed the content …

Member Avatar for Shankar.Shiv
0
942
Member Avatar for happygeek

If you don't know who [Alan Turing](http://en.wikipedia.org/wiki/Alan_Turing) was, then shame on you. The British code breaker, mathematics genius and father of both computer science and artificial intelligence is rightly credited with helping to bring the second world war to an end. Turing was also gay, and that's where the shame …

Member Avatar for Lifei_1
8
739
Member Avatar for happygeek

Earlier this month, security outfit FireEye’s 'FireEye as a Service' researchers out in Singapore [discovered and reported](https://www.fireeye.com/blog/threat-research/2015/06/operation-clandestine-wolf-adobe-flash-zero-day.html) on a phishing campaign that was found to be exploiting a zero-day in Adobe Flash Player vulnerability (CVE-2015-3113). That campaign has been well and truly active for a while now, with attacking emails …

Member Avatar for diafol
2
517
Member Avatar for happygeek

It's been a year now since the Dyre malware family was first profiled, and there is no sign of infection rates slowing down. In fact, [reports](http://www.scmagazine.com/trend-micro-documents-new-malware-infections/article/418266/) would seem to suggest just the opposite with infections up from 4,000 at the end of last year to 9,000 at the start of …

Member Avatar for Tcll
1
521
Member Avatar for happygeek

While keen to point out that Microsoft's TechNet portal security was "in no way compromised" by the tactic, researchers with security outfit FireEye [discovered](https://www.fireeye.com/blog/threat-research/2015/05/hiding_in_plain_sigh.html) that [a well established China-based hacking campaign called Deputy Dog](https://www.fireeye.com/blog/threat-research/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html) had managed to create profiles and posts on TechNet that contained embedded Command and Control codes …

1
405
Member Avatar for happygeek

It all started pretty well, with the announcement by Mozilla at the end of last month that the Firefox web browser would make the Internet a safer place by encrypting everything. That's everything, even those connections where the servers don't even support the HTTPS protocol. Developers of the Firefox browser …

1
451
Member Avatar for happygeek

Content Management Systems (CMS) may not be the most interesting topic on the tech table, but oh boy does WordPress liven things up in this sector. Not, it has to be said, always in a good way. I've lost count of the number of WordPress vulnerability stories that I've read …

Member Avatar for happygeek
3
427
Member Avatar for happygeek

Spring has been getting rather unseasonably hot for Apache users as far as security flaws go. First there was news of how the FREAK (Factoring Attack on RSA-EXPORT Keys) vulnerability could impact Apache. For more on FREAK see this [excellent analysis](http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html) by Matthew Green, a cryptographer and research professor at …

1
312
Member Avatar for happygeek

Addressing last weeks Securi-Tay conference hosted by the Abertay Ethical Hacking Society in Scotland, Stephen Tomkinson from the NCC Group detailed how Blu-ray players can do more than play videos; they can open up a new attack surface for the hacker. Tomkinson demonstrated a new tool that had been released …

2
409
Member Avatar for happygeek

"Our investigation currently indicates that the attackers accessed Adobe customer IDs and encrypted passwords on our systems. We also believe the attackers removed from our systems certain information relating to 2.9 million Adobe customers, including customer names, encrypted credit or debit card numbers, expiration dates, and other information relating to …

Member Avatar for diafol
3
491
Member Avatar for happygeek

2014 was not a good year for Microsoft, with the Xbox Live network being disrupted at both ends of December by [Lizard Squad DDoS attacks](https://www.daniweb.com/software-development/game-development/news/488412/lizard-squad-claims-responsibility-for-taking-down-xbox-live-today) and then as the year was finally coming to an end a different hacking collective dropped another bomb onto Xbox. A posting on Twitter simply …

Member Avatar for RobertHDD
0
633
Member Avatar for EddieC

Microsoft this week acquired [url=http://www.teamprise.com/]Teamprise[/url], a division of [url=http://www.sourcegear.com/]SourceGear[/url] that built tools to give developers access to Visual Studio 2008 Team Foundation Server from systems running Linux, Mac OS X and Unix.SourceGear's flagship [url=http://www.sourcegear.com/sos/]SourceOffSite[/url] provides remote access to Visual SouceSafe, Microsoft's version control system. Teamprise comes in [url=http://www.teamprise.com/products/download/]three forms[/url]. The …

Member Avatar for mike_2000_17
1
1K
Member Avatar for mikeandike22

If you are a programmer than you probably know or at least know of C++ well now a company called Digital Mars is developing the D programming lanugage. [I] "D is a systems programming language. Its focus is on combining the power and high performance of C and C++ with …

Member Avatar for The Old Man
1
476
Member Avatar for happygeek

Google has been quick to blacklist domains implicated, most often unwittingly, in the distribution of what has become known as the SoakSoak malware campaign courtesy of soaksoak.ru being the first domain in the redirection path it used. With 11,000 domains blocked over the weekend, you might be forgiven for thinking …

2
653
Member Avatar for happygeek

A group describing itself as "DDoS kings" who "just want to watch the world burn" has claimed responsibility for taking the Microsoft Xbox Live network down for an hour or two earlier today. The [Lizard Squad](https://twitter.com/LizardPatrol), posting from a Twitter account called LizardPatrol, published a message warning that "Microsoft will …

1
600
Member Avatar for happygeek

Think that macro viruses written in VBA (Visual Basic for Applications) are just something that people using the Internet a couple of decades ago had to worry about? Think again. Word macro attacks never went away, they just went into decline. New evidence suggests they could be making something of …

Member Avatar for happygeek
1
1K
Member Avatar for happygeek

You might be forgiven for thinking that the iPhone is the most secure of the smartphone choices, especially if you've opted for a 5S or above with that fingerprint reader for secure ID and iOS 8 as the most robust of operating systems. Forgiven, but wrong; despite the claims from …

Member Avatar for happygeek
1
493
Member Avatar for happygeek

A Drupal security advisory, [SA-CORE-2014-005](https://www.drupal.org/SA-CORE-2014-005), rather embarrassingly states that: > Drupal 7 includes a database abstraction API to ensure that queries executed against the database are sanitized to prevent SQL injection attacks. A vulnerability in this API allows an attacker to send specially crafted requests resulting in arbitrary SQL execution. …

2
352
Member Avatar for happygeek

As well as being CEO of penetration testing specialists High-Tech Bridge, Ilia Kolochenko is also perhaps unsurprisingly a white hat hacker of some repute. Equally unsurprising is the fact that he has [warned](https://www.htbridge.com/blog/plugins_and_extensions_the_achilles_heel_of_popular_cmss.html) that security vulnerabilities in leading CMS platforms such as Drupal, Joomla and WordPress are effectively leaving the …

Member Avatar for iamthwee
4
755
Member Avatar for happygeek

A report from Hold Security claims that one of the biggest ever online heists has been committed by a Russian crime gang. It would appear that the data theft includes, wait for it, no less than 1.2 billion (yes billion) username and passwords along with around half a billion email …

Member Avatar for F-3000
2
352
Member Avatar for happygeek

Bugs are, and always have been, a fact of life for the software developer. However, if Microsoft researcher Andrew Begel has his way, they could be a thing of the past. Last month a paper entitled '[Using Psycho-Physiological Measures to Assess Task Difficulty in Software Development](http://research.microsoft.com/apps/pubs/default.aspx?id=209878)' was published which Begel …

Member Avatar for Hiroshe
1
299
Member Avatar for happygeek

Another day, another breach. The latest to disclose that there had been some 'unauthorised access' to systems and internal company data' is music streaming service Spotify. The disclosure itself was something of an odd one, claiming that investigation suggested only a single user's data had been compromised following an issue …

Member Avatar for <M/>
1
309
Member Avatar for happygeek

Feedly app left attack window open for malicious JavaScript hackers according to one security researcher. Security consultant and blogger Jeremy S [revealed](http://breaktoprotect.blogspot.in/2014/04/feedly-android-application-zero-day.html) that the Feedly Android app, or at least the version prior to the update on March 17th 2014, had been subject to a zero-day JavaScript code injection vulnerability. …

0
370
Member Avatar for happygeek

Wearable computing has been a buzzword for so long that it's easy to get blinded by the hype and not realise that actually it's a reality; and one that got even more real with the announcement by Google of Android Wear. Forget the fitness bands of today and the 'smart …

Member Avatar for happygeek
0
1K
Member Avatar for happygeek

It has been [officially confirmed](http://php.net/archive/2013.php#id2013-10-24-2) that the php.net website of the open-source PHP programming language has been hacked and infected with malware. The successful breach of the site came to light yesterday morning when the Google Safe Browsing service started flagging php.net as serving up malicious scripts. This was, at …

Member Avatar for Mohammed_9
13
797
Member Avatar for happygeek

The average DaniWeb member if not already au fait with Pastebin.com is almost certainly aware of something like it. A pastebin has become, for many programmers, a default tool in the coding box and for very good reason: it makes sharing large quantities of code very easy indeed. Of course, …

Member Avatar for happygeek
0
1K
Member Avatar for happygeek

As a gamer myself, I thought that last year was a pretty good one. After all, not only did I get to play both GTA V and Call of Duty: Ghosts (indeed, I'm still playing it and working my may through the prestige levels) but if I had enough spare …

Member Avatar for DarkSealer
0
661
Member Avatar for EddieC

Companies using IBM's Rational and Tivoli product will breathe easier today, thanks to new, integrated versions of nine tools that the company says will facilitate communication and closer collaboration between software development and support teams in the enterprise. What's more, prices will remain where they are, and the updates are …

Member Avatar for Ancient Dragon
0
338
Member Avatar for happygeek

Aggressive adware, of the kind that creates shortcuts on your screen or changes your search engine configuration, has arrived on Android devices and then some. According to security vendor Bitdefender, as much as 90% of free Android apps contain adware with up to 75% coming with the 'aggressive' variety. ![dweb-androidadware](/attachments/small/0/dweb-androidadware.jpg …

Member Avatar for luutrudulieubk
0
575
Member Avatar for happygeek

Last week, the NoSQL database host MongoHQ suffered a breach which exposed customer files, email addresses and password data to the attackers. The ripples from that breach are still being felt, as users of the Sunrise calendar app on the iPhone found out this morning. Luckily that password data was …

Member Avatar for long.duckdong.1848
0
545
Member Avatar for happygeek

In the newly published Imperva 'Hacker Intelligence Initiative Report' the in-the-wild modification and exploitation of PHP SuperGlobal variables has been investigated. This particular external variable modification weakness has been described as being where a PHP application does "not properly protect against the modification of variables from external sources, such as …

Member Avatar for Gaetane
4
620
Member Avatar for happygeek

In what has been called by some commentators the ‘most significant update in five years’ the latest version of Python finally come of age. Python 2.5 not only apparently fixes some 450 bugs discovered since the 2.4 release was, err, released, but also throws in some 350 patches for good …

Member Avatar for vegaseat
0
743
Member Avatar for happygeek

When [Exponential Interactive](http://exponential.com/), an advertising intelligence provider, analysed the actual behaviour of more than two million Brits viewing Grand Theft Auto content online, the [results](http://meteorpublicrelations.com/wp-content/uploads/2013/10/GTA-insights-from-Exponential.jpg) were rather surprising. ![ae2cdc7c96447a4e0d6acabda34a5cbd](/attachments/large/0/ae2cdc7c96447a4e0d6acabda34a5cbd.jpg "ae2cdc7c96447a4e0d6acabda34a5cbd") Here are the key conclusions: The GTA audience are 33% more likely than the average internet user to have children; …

0
308
Member Avatar for happygeek

According to research covering more than 100 universities across the globe from earlier this year, 58% of the academic leaders questioned believed COBOL programming should be on the curriculum. Yet only 27% could confirm that was the case, and only 18% had COBOL as a core part of the course …

Member Avatar for happygeek
0
3K
Member Avatar for happygeek

Within days of the New York Times website suffering an outage which was widely reported as being down to another cyber attack, although the NYT itself insists it was actually an internal issue following system maintenance, media sites belonging to CNN, Time and the Washington Post have been attacked by …

Member Avatar for LastMitch
1
340
Member Avatar for happygeek

According to the fourth annual [Web Application Attack Report](http://www.imperva.com/download.asp?id=419) from Imperva retailers suffer from twice as many SQL injection attacks when compared to other industry sectors. What's more, the United States remains the number one source of all web attacks. Other key findings of the report include the startling revelation …

Member Avatar for LastMitch
3
332
Member Avatar for happygeek

Java vulnerabilities have hardly been out of the news during the last year. Here at DaniWeb we've covered a number of the stories as they surfaced: [Java in the cross-hairs: the security debate rolls on](http://www.daniweb.com/software-development/java/news/445532/java-in-the-cross-hairs-the-security-debate-rolls-on), [Is Java 7 still insecure? Oracle Patch doesn't fix underlying vulnerability](http://www.daniweb.com/software-development/java/threads/432479/is-java-7-still-insecure-oracle-patch-doesnt-fix-underlying-vulnerability), [Update my insecure Java …

Member Avatar for masijade
3
370
Member Avatar for happygeek

A couple of years ago, a 17 year old was arrested for his part in a denial of service attack against gamers playing the online multiplayer version of Call of Duty: Black Ops. The teenager was accused of selling cheat software called 'Phenom Booter' which prevented others from playing (it's …

Member Avatar for mrgreen
1
516
Member Avatar for happygeek

A successful tournament poker player from Japan, with earnings estimated at $1.5 million from his prowess at bluffing and holding his nerve under pressure, has been arrested and charged with being behind an Android malware distribution operation that netted even more: $3.9 million according to Symantec. The Chiba Prefectural Police …

0
413
Member Avatar for happygeek

According to a new survey of more than 2,000 British workers, 38% of them insisted they were 'content' with their career progression. When it comes to the tech sector, 39% were happy with their career ladder climbing which, according to Randstad Technologies which carried out the research, makes them happier …

Member Avatar for CCHIndiaStore
1
366
Member Avatar for happygeek

[![Perforce Software](/attachments/small/0/b6af75be8ad198722ef5cae5061023d5.jpg "align-right")](http://www.perforce.com) Perforce Software has today shared five essential tips for software development teams to consider by way of spring cleaning the development environment. These management guidelines are designed to help maintain well-organized codebases as well as improving the overall development process. Randy DeFauw, senior product manager at Perforce …

Member Avatar for CCHIndiaStore
2
401
Member Avatar for happygeek

Konami, the Japanese games developer responsible for such genre defining classics as Metal Gear Solid and Silent Hill, has confirmed that tens of thousands of customer accounts have been put at risk due to a breach of the Konami ID portal site. During a period between the 13th June and …

1
379
Member Avatar for happygeek

There are precious few archaeologists in Japan, and only a handful who produce their own software programs to analyze geographic information. One who does is Professor [Izumi Niiro](http://www.okayama-u.ac.jp/user/arch/about/niiro.html) of the Okayama University. A convert from Perl, Professor Niiro now uses Python to perform data analysis via the Geographic Resources Analysis …

1
473
Member Avatar for happygeek

DaniWeb, the 10 year old IT discussion community with more than a million members, is always looking forward and never stops introducing new features and functions for users. When spammers managed to get the better of the (highly customised) vBulletin forum platform which had been driving DaniWeb since the get …

2
258
Member Avatar for happygeek

According to new research from Randstad Technologies, a specialist recruitment company, less than half of those working in the IT and technology industry in the United Kingdom are happy with their levels of pay. By contrast, however, 60% appear to be quite happy with their jobs despite of this. Interestingly, …

Member Avatar for diafol
1
491
Member Avatar for happygeek

Last week saw the discovery of YAJE: Yet Another Java Exploit. Sadly, Java vulnerabilities are neither new nor uncommon and the bad guys are quick to exploit them in the wild. Some claim that Oracle is in too much of a rush to extricate itself from this unholy mess and …

Member Avatar for gyno
3
563

The End.