Apple dismisses Safari download issue
A security researcher has published a demonstration exploit that takes advantage of the download mechanism in Apple's Safari browser to automatically download files onto a user's system.
A security researcher has published a demonstration exploit that takes advantage of the download mechanism in Apple's Safari browser to automatically download files onto a user's system.
Security researchers have discovered a complex spamming scheme that hijacks users' PCs in order to attempt to send junk mail via university and military systems.
Enterprises as a whole may be holding off on virtualizing their data centers, but the majority of top-tier U.S. and U.K. banks are already implementing virtualization across different parts of their infrastructures, according to just-released Microsoft-funded research.
A group of German researchers has unveiled the first publicly released research attempting to actively disrupt a peer-to-peer botnet - using as their case study the notorious Storm worm.
TapRoot Systems this week began offering a freely downloadable version of a recently launched carrier product that turns Wi-Fi-equipped 3G smartphones into wireless hotspots, in an effort to simplify mobile Internet access.
Security researchers are free to investigate Microsoft's online services for security bugs, without fear of prosecution - as long as they submit the bugs they find "responsibly" to Microsoft, the company said this week.
Linux is expanding its influence outside of the world of smartphones, and is poised to take a significant share of the mid-range mobile phone market as well, according to a new study from ABI Research.
Business travellers to Russia might want to keep their laptops and iPhones well-concealed - not from muggers, necessarily, but from the country's recently formed regulatory super-agency, Rossvyazokhrankultura (short for the Russian Mass Media, Communications and Cultural Protection Service).
A security researcher has uncovered a serious flaw in Google Spreadsheets, which could give an attacker access to all of a user's Google services.
SpikeSource has announced a service aimed at letting smaller software makers automatically test their products for particular software stacks, potentially opening up significant opportunities for software start-ups and open source developers.
A British security researcher has demonstrated a "biologging" system for intercepting biometric authentication data, warning that attacks on biometric systems could become relatively straightforward if current practices don't change.
Apple has been hit by a class-action lawsuit claiming the company deceived customers over the quality of the screens in the 20-inch iMacs launched last summer.
Data center cooling and power consumption costs, boosted by higher-than-expected rates of server rollout, are leading data centers into an economic crisis, according to a survey of 311 enterprise data center managers by the Uptime Institute.
Red Hat has rolled out a beta-test of the next version of its flagship OS, Red Hat Enterprise Linux (RHEL) 5.2, with a new kernel and significant changes aimed at server farms and at workstations.
The European Commission has cleared the way for French government plans to fund a European search engine to rival Google.