271 News Story Topics
Remove Filter ![]() | |
Imagine my surprise when I learned this morning that an [URL="http://news.cnet.com/8301-13924_3-10216733-64.html?part=rss&subj=news&tag=2547-1_3-0-5"]IBM researcher believes[/URL] that Moore's Law-- that the number of transistors on a micro processor would double nearly every two years-- could be nearing the end of its run. Amazingly Moore made this prediction in 1965 and his law has … | |
[URL="http://www.ibm.com"]IBM[/URL] researchers have [URL="http://www.zurich.ibm.com/news/07/asme.html"]unveiled[/URL] prototype 3D visualisation software that will enable doctors to interact with their medical data in pretty much the same way they interact with their patients. The technology, known as the Anatomic and Symbolic Mapper Engine (ASME), uses an avatar representation of the human body which the … | |
Many aspiring entrepreneurs want to start their business online but quite a few of this lot actually succeeds in turning their awesome application idea into reality. The question arises, what to do with a crazy app idea? Generally, businesses having their own mobile apps, ensure a strong connection with their … | |
Last week a group of six 'm-commerce' experts took part in a round robin discussion in Manchester, England to determine the best ways forward for developers interested in creating a serious mobile web presence yet wanting to make money through the medium of mobile advertising at the same time. Anyone … | |
The second annual Imperva Hacker Intelligence Initiative report, this one entitled [Monitoring Hacker Forums](http://www.imperva.com/docs/HII_Monitoring_Hacker_Forums_2012.pdf), is out and reveals that the threat surfaces being discussed by the hacker community are very different from those that businesses are spending money on defending against attack.  The Imperva research analysed the content … | |
If you don't know who [Alan Turing](http://en.wikipedia.org/wiki/Alan_Turing) was, then shame on you. The British code breaker, mathematics genius and father of both computer science and artificial intelligence is rightly credited with helping to bring the second world war to an end. Turing was also gay, and that's where the shame … | |
Earlier this month, security outfit FireEye’s 'FireEye as a Service' researchers out in Singapore [discovered and reported](https://www.fireeye.com/blog/threat-research/2015/06/operation-clandestine-wolf-adobe-flash-zero-day.html) on a phishing campaign that was found to be exploiting a zero-day in Adobe Flash Player vulnerability (CVE-2015-3113). That campaign has been well and truly active for a while now, with attacking emails … ![]() | |
It's been a year now since the Dyre malware family was first profiled, and there is no sign of infection rates slowing down. In fact, [reports](http://www.scmagazine.com/trend-micro-documents-new-malware-infections/article/418266/) would seem to suggest just the opposite with infections up from 4,000 at the end of last year to 9,000 at the start of … | |
While keen to point out that Microsoft's TechNet portal security was "in no way compromised" by the tactic, researchers with security outfit FireEye [discovered](https://www.fireeye.com/blog/threat-research/2015/05/hiding_in_plain_sigh.html) that [a well established China-based hacking campaign called Deputy Dog](https://www.fireeye.com/blog/threat-research/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html) had managed to create profiles and posts on TechNet that contained embedded Command and Control codes … | |
It all started pretty well, with the announcement by Mozilla at the end of last month that the Firefox web browser would make the Internet a safer place by encrypting everything. That's everything, even those connections where the servers don't even support the HTTPS protocol. Developers of the Firefox browser … | |
Content Management Systems (CMS) may not be the most interesting topic on the tech table, but oh boy does WordPress liven things up in this sector. Not, it has to be said, always in a good way. I've lost count of the number of WordPress vulnerability stories that I've read … | |
Spring has been getting rather unseasonably hot for Apache users as far as security flaws go. First there was news of how the FREAK (Factoring Attack on RSA-EXPORT Keys) vulnerability could impact Apache. For more on FREAK see this [excellent analysis](http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html) by Matthew Green, a cryptographer and research professor at … | |
Addressing last weeks Securi-Tay conference hosted by the Abertay Ethical Hacking Society in Scotland, Stephen Tomkinson from the NCC Group detailed how Blu-ray players can do more than play videos; they can open up a new attack surface for the hacker. Tomkinson demonstrated a new tool that had been released … | |
"Our investigation currently indicates that the attackers accessed Adobe customer IDs and encrypted passwords on our systems. We also believe the attackers removed from our systems certain information relating to 2.9 million Adobe customers, including customer names, encrypted credit or debit card numbers, expiration dates, and other information relating to … ![]() | |
2014 was not a good year for Microsoft, with the Xbox Live network being disrupted at both ends of December by [Lizard Squad DDoS attacks](https://www.daniweb.com/software-development/game-development/news/488412/lizard-squad-claims-responsibility-for-taking-down-xbox-live-today) and then as the year was finally coming to an end a different hacking collective dropped another bomb onto Xbox. A posting on Twitter simply … | |
Microsoft this week acquired [url=http://www.teamprise.com/]Teamprise[/url], a division of [url=http://www.sourcegear.com/]SourceGear[/url] that built tools to give developers access to Visual Studio 2008 Team Foundation Server from systems running Linux, Mac OS X and Unix.SourceGear's flagship [url=http://www.sourcegear.com/sos/]SourceOffSite[/url] provides remote access to Visual SouceSafe, Microsoft's version control system. Teamprise comes in [url=http://www.teamprise.com/products/download/]three forms[/url]. The … | |
If you are a programmer than you probably know or at least know of C++ well now a company called Digital Mars is developing the D programming lanugage. [I] "D is a systems programming language. Its focus is on combining the power and high performance of C and C++ with … | |
Google has been quick to blacklist domains implicated, most often unwittingly, in the distribution of what has become known as the SoakSoak malware campaign courtesy of soaksoak.ru being the first domain in the redirection path it used. With 11,000 domains blocked over the weekend, you might be forgiven for thinking … | |
A group describing itself as "DDoS kings" who "just want to watch the world burn" has claimed responsibility for taking the Microsoft Xbox Live network down for an hour or two earlier today. The [Lizard Squad](https://twitter.com/LizardPatrol), posting from a Twitter account called LizardPatrol, published a message warning that "Microsoft will … | |
Think that macro viruses written in VBA (Visual Basic for Applications) are just something that people using the Internet a couple of decades ago had to worry about? Think again. Word macro attacks never went away, they just went into decline. New evidence suggests they could be making something of … | |
You might be forgiven for thinking that the iPhone is the most secure of the smartphone choices, especially if you've opted for a 5S or above with that fingerprint reader for secure ID and iOS 8 as the most robust of operating systems. Forgiven, but wrong; despite the claims from … | |
A Drupal security advisory, [SA-CORE-2014-005](https://www.drupal.org/SA-CORE-2014-005), rather embarrassingly states that: > Drupal 7 includes a database abstraction API to ensure that queries executed against the database are sanitized to prevent SQL injection attacks. A vulnerability in this API allows an attacker to send specially crafted requests resulting in arbitrary SQL execution. … | |
As well as being CEO of penetration testing specialists High-Tech Bridge, Ilia Kolochenko is also perhaps unsurprisingly a white hat hacker of some repute. Equally unsurprising is the fact that he has [warned](https://www.htbridge.com/blog/plugins_and_extensions_the_achilles_heel_of_popular_cmss.html) that security vulnerabilities in leading CMS platforms such as Drupal, Joomla and WordPress are effectively leaving the … ![]() | |
A report from Hold Security claims that one of the biggest ever online heists has been committed by a Russian crime gang. It would appear that the data theft includes, wait for it, no less than 1.2 billion (yes billion) username and passwords along with around half a billion email … | |
Bugs are, and always have been, a fact of life for the software developer. However, if Microsoft researcher Andrew Begel has his way, they could be a thing of the past. Last month a paper entitled '[Using Psycho-Physiological Measures to Assess Task Difficulty in Software Development](http://research.microsoft.com/apps/pubs/default.aspx?id=209878)' was published which Begel … | |
Another day, another breach. The latest to disclose that there had been some 'unauthorised access' to systems and internal company data' is music streaming service Spotify. The disclosure itself was something of an odd one, claiming that investigation suggested only a single user's data had been compromised following an issue … | |
Feedly app left attack window open for malicious JavaScript hackers according to one security researcher. Security consultant and blogger Jeremy S [revealed](http://breaktoprotect.blogspot.in/2014/04/feedly-android-application-zero-day.html) that the Feedly Android app, or at least the version prior to the update on March 17th 2014, had been subject to a zero-day JavaScript code injection vulnerability. … | |
Wearable computing has been a buzzword for so long that it's easy to get blinded by the hype and not realise that actually it's a reality; and one that got even more real with the announcement by Google of Android Wear. Forget the fitness bands of today and the 'smart … | |
It has been [officially confirmed](http://php.net/archive/2013.php#id2013-10-24-2) that the php.net website of the open-source PHP programming language has been hacked and infected with malware. The successful breach of the site came to light yesterday morning when the Google Safe Browsing service started flagging php.net as serving up malicious scripts. This was, at … | |
The average DaniWeb member if not already au fait with Pastebin.com is almost certainly aware of something like it. A pastebin has become, for many programmers, a default tool in the coding box and for very good reason: it makes sharing large quantities of code very easy indeed. Of course, … | |
As a gamer myself, I thought that last year was a pretty good one. After all, not only did I get to play both GTA V and Call of Duty: Ghosts (indeed, I'm still playing it and working my may through the prestige levels) but if I had enough spare … | |
Companies using IBM's Rational and Tivoli product will breathe easier today, thanks to new, integrated versions of nine tools that the company says will facilitate communication and closer collaboration between software development and support teams in the enterprise. What's more, prices will remain where they are, and the updates are … | |
Aggressive adware, of the kind that creates shortcuts on your screen or changes your search engine configuration, has arrived on Android devices and then some. According to security vendor Bitdefender, as much as 90% of free Android apps contain adware with up to 75% coming with the 'aggressive' variety. , an advertising intelligence provider, analysed the actual behaviour of more than two million Brits viewing Grand Theft Auto content online, the [results](http://meteorpublicrelations.com/wp-content/uploads/2013/10/GTA-insights-from-Exponential.jpg) were rather surprising.  Here are the key conclusions: The GTA audience are 33% more likely than the average internet user to have children; … | |
According to research covering more than 100 universities across the globe from earlier this year, 58% of the academic leaders questioned believed COBOL programming should be on the curriculum. Yet only 27% could confirm that was the case, and only 18% had COBOL as a core part of the course … | |
Within days of the New York Times website suffering an outage which was widely reported as being down to another cyber attack, although the NYT itself insists it was actually an internal issue following system maintenance, media sites belonging to CNN, Time and the Washington Post have been attacked by … ![]() | |
According to the fourth annual [Web Application Attack Report](http://www.imperva.com/download.asp?id=419) from Imperva retailers suffer from twice as many SQL injection attacks when compared to other industry sectors. What's more, the United States remains the number one source of all web attacks. Other key findings of the report include the startling revelation … ![]() | |
Java vulnerabilities have hardly been out of the news during the last year. Here at DaniWeb we've covered a number of the stories as they surfaced: [Java in the cross-hairs: the security debate rolls on](http://www.daniweb.com/software-development/java/news/445532/java-in-the-cross-hairs-the-security-debate-rolls-on), [Is Java 7 still insecure? Oracle Patch doesn't fix underlying vulnerability](http://www.daniweb.com/software-development/java/threads/432479/is-java-7-still-insecure-oracle-patch-doesnt-fix-underlying-vulnerability), [Update my insecure Java … | |
A couple of years ago, a 17 year old was arrested for his part in a denial of service attack against gamers playing the online multiplayer version of Call of Duty: Black Ops. The teenager was accused of selling cheat software called 'Phenom Booter' which prevented others from playing (it's … | |
A successful tournament poker player from Japan, with earnings estimated at $1.5 million from his prowess at bluffing and holding his nerve under pressure, has been arrested and charged with being behind an Android malware distribution operation that netted even more: $3.9 million according to Symantec. The Chiba Prefectural Police … | |
According to a new survey of more than 2,000 British workers, 38% of them insisted they were 'content' with their career progression. When it comes to the tech sector, 39% were happy with their career ladder climbing which, according to Randstad Technologies which carried out the research, makes them happier … | |
[](http://www.perforce.com) Perforce Software has today shared five essential tips for software development teams to consider by way of spring cleaning the development environment. These management guidelines are designed to help maintain well-organized codebases as well as improving the overall development process. Randy DeFauw, senior product manager at Perforce … | |
Konami, the Japanese games developer responsible for such genre defining classics as Metal Gear Solid and Silent Hill, has confirmed that tens of thousands of customer accounts have been put at risk due to a breach of the Konami ID portal site. During a period between the 13th June and … | |
There are precious few archaeologists in Japan, and only a handful who produce their own software programs to analyze geographic information. One who does is Professor [Izumi Niiro](http://www.okayama-u.ac.jp/user/arch/about/niiro.html) of the Okayama University. A convert from Perl, Professor Niiro now uses Python to perform data analysis via the Geographic Resources Analysis … | |
DaniWeb, the 10 year old IT discussion community with more than a million members, is always looking forward and never stops introducing new features and functions for users. When spammers managed to get the better of the (highly customised) vBulletin forum platform which had been driving DaniWeb since the get … | |
According to new research from Randstad Technologies, a specialist recruitment company, less than half of those working in the IT and technology industry in the United Kingdom are happy with their levels of pay. By contrast, however, 60% appear to be quite happy with their jobs despite of this. Interestingly, … ![]() | |
Last week saw the discovery of YAJE: Yet Another Java Exploit. Sadly, Java vulnerabilities are neither new nor uncommon and the bad guys are quick to exploit them in the wild. Some claim that Oracle is in too much of a rush to extricate itself from this unholy mess and … |
The End.