Category: WWW News

Turla espionage operation infects Linux systems with malware

A newly discovered malware program designed to infect Linux systems is tied to a sophisticated cyberespionage operation of Russian origin dubbed Epic Turla, security researchers found. The Turla campaign, also known as Snake or Uroburos, was originally uncovered in February, but goes back several years. The massive operation infected computers …

READ MORE

Google удалила все приложения The Pirate Bay

Google удалила из магазина Play Store все приложения для работы с популярным торрент-трекером The Pirate Bay. Компания объяснила разработчикам, что эти программы противоречили политике Google в области защиты интеллектуальной собственности. …

READ MORE

Microsoft планирует возможность обновления с Windows 10 Preview до RTM

Хотя мы уже знаем, что первая потребительская сборка Windows 10 выйдет в конце января, а финальный вариант мы увидим где-то в конце лета или осенью, до сих пор открытым остается вопрос о параметрах обновления. В частности, пользователи задаются вопросом, смогут ли они обновить Windows 10 Preview до RTM, когда последняя …

READ MORE

Building a private cloud, of sorts, with OwnCloud

Getting cloudy has always been a mixed proposition in the IT world. Your users want the convenience of using a variety of devices and having their work accessible on all of those devices from wherever they are, whereas you still have to worry about data security, lost computers, federal regulation …

READ MORE

Now P.O.O.D.L.E. poos on flaw in TLS

Remember October’s flap about the vulnerability in SSL, known as POODLE? Remember all the smug people running servers that only supported TLS? Well, they may not be so smug this morning. It turns out that some TLS implementations are vulnerable to a variant of the same ‘padding’ issue. Here we …

READ MORE

Xiaomi Mi5 покажут в январе на CES 2015

Фанатам качественной китайской техники будет интересно узнать о том, что новый смартфон Xiaomi Mi5, обладающий экстремально маленьким ободком будет представлен на всемирной выставке Consumer Electronics Show (CES) 2015, которая стартует в следующем месяце в Лас Вегасе. Согласно аналитику Mobile Telecom Суну Ченгхью (Sun Changxu), аппарат будет обладать дисплеем, размер которого …

READ MORE

Getting in customers’ faces

Retailers love thinking about how they can use IT analytics of social media to get close to their customers. But when a retailer breaks through the invisible social media wall and reacts to an online post with a very personal in-store interaction, it may not reap the desired increased-sales outcome. …

READ MORE

NEC image-processing tech can detect invisible damage to bridges

NEC has developed a camera system that can detect deterioration in bridges and other structures simply by analyzing imagery. The electronics manufacturer is calling it the world’s first system to use high-definition video cameras and image-recognition technologies to analyze and estimate structural vibrations. NEC researchers developed an algorithm that can …

READ MORE

A fresh look at communications regulation

The last time that Congress enacted major telecommunications regulation reform, in 1996, the state of technology was very different than it is today: Fewer than 15% of Americans had a mobile phone, under one-third of U.S. households were online, and virtually all of those that were online had only slow, …

READ MORE

Hackers contacted top Sony executives before attack

Top executives at Sony Pictures received an email extorting money three days before the company’s computer network was taken offline in a major hack. The email message was among thousands released on Monday when the email boxes of two top Sony executives were leaked online. It was the latest release …

READ MORE

Hackers leak top Sony execs’ emails

The email boxes of two top Sony executives were leaked online on Monday, the latest release of potentially embarrassing corporate information following a major hack on the company’s computer networks two weeks ago. The files were uploaded to file-sharing sites and the Bit Torrent file-sharing network, and links to them …

READ MORE


Copyright © 2025  WWWCOST All rights reserved | Thanks: SeLLines
dmnsa | truthua | buy! | meneedit