Search Results

Results 1241-1260 of 1986 for John P. Mello Jr.
SPOTLIGHT ON SECURITY

Jailbroken Phones Targeted by Hacker Jammers

Smartphones hacked to run unauthorized programs or unlock features are being targeted by hackers and can pose a threat to enterprise networks, warned Marble Security ...

Microsoft Takes New Photosynth Out for a Spin

Microsoft on Tuesday previewed the third generation of its Photosynth technology, touting it as a dramatic step forward in smoothness and simplicity. ...

SPOTLIGHT ON SECURITY

Malware Drop, Ransomware Rise Forecast for 2014

A malware decline and ransomware rise are in the security crystal ball for 2014 ...

SPOTLIGHT ON SECURITY

Potential for Abuse Stalls Cellphone Kill Switch Debate

Law enforcement officials and mobile phone makers last week knocked heads with wireless carriers over planting "kill switches" in smartphones ...

SPOTLIGHT ON SECURITY

97 Percent of Company Mobile Apps Are Insecure

Mobile apps for consumers have been criticized for gathering more information from users' devices than they need. It seems, however, that mobile apps from companies fare no better ...

MakerBot Rallies Support for Classroom 3D Printers

There's a campaign afoot to put a 3D printer in every school in America. MakerBot -- along with education crowdsourcer DonorsChoose.org, America Makes and Autodesk -- on Tuesday announced MakerBot Academy. ...

SPOTLIGHT ON SECURITY

KitKat Raises Android Security Bar

Google's mobile operating system Android has been a whipping boy for some segments of the security community, but the latest version of the software may begin to rehabilitate its reputation ...

Mrs. B, Author Square Off Over ‘Everything Store’

Mammoth tomes about high-tech entrepreneurs with a secretive bent are almost a sure bet to stir up a hornet's nest of controversy when they're published. That's certainly been the case with Brad Stone's The Everything Store about CEO Jeff Bezos and Amazon. The twist here is that the critic in the point position for Amazon is Bezos's wife, MacKenzie...

SPOTLIGHT ON SECURITY

IE Gets Top Props for Thwarting Socially Engineered Malware

Using social engineering to distribute malware is a favorite of hackers. That's because it unloads the burden of infecting a computer onto its operator. By duping an Internet innocent into making just one errant click, an online bandit can inflict a world of hurt ...

SPOTLIGHT ON SECURITY

‘Hacker Madness’ Strikes Idaho Judge

A federal judge in Idaho appears to have had a fit of hacker madness ...

SPOTLIGHT ON SECURITY

Strong Encryption, Natural Language Search Make Potent Cocktail

Strong encryption and natural language search can be like oil and water. That's because encrypted data can't be digested by your typical search engine. However, CipherCloud announced a solution to that knotty problem last week ...

Swartz’s Whistleblower Protection Scheme to Carry On

A press freedom advocacy group announced Tuesday it would be taking charge of a project started by Aaron Swartz to protect whistleblowers leaking confidential documents to journalists ...

SPOTLIGHT ON SECURITY

‘Paunch’ Arrest Puts Blackhole Hackers on Data Diet

When Russian authorities nabbed the alleged master hacker behind the Blackhole malware kit last week, they sent a shockwave through the digital underground ...

Nest Brings Brains and Brawn to Smoke Detection

The company that brought Apple-style elegance to the lowly home thermostat is attempting to do the same for the common smoke detector ...

SPOTLIGHT ON SECURITY

Encryption Lets NSA Store Your Email Forever

If you want to prolong your email's stay with the NSA, just encrypt it ...

Google’s New EU Deal – Same as the Old Deal?

After three years of wrangling with Google over its alleged anticompetitive business practices, the European Union has suggested there may be some light at the end of the tunnel ...

SPOTLIGHT ON SECURITY

Reengineering Human Behavior Can Foil Phishing

Almost all cyberattacks these days require an element of social engineering. Spammers are always looking for that hot button to induce a click on a link or an attachment. Drive-by artists continually experiment with poisoned banner ads designed to steer the curious into an online dark alley. Spearphishers put together persuasive pitches pretending to be friends or a trusted institution...

NY ‘Text Stops’ Drive Home Safety Message

New York Gov. Andrew Cuomo on Tuesday unveiled a plan to identify existing Park-n-Ride facilities, rest stops and parking areas on the state's highways as "Texting Zones." ...

SPOTLIGHT ON SECURITY

BYOD Security Is All About Juggling Risks

Allowing workers to use personal phones and tablets to do their jobs has created security risks in the workplace, but those risks can be minimized if they're managed ...

Heavy Attacks Expected as Microsoft Scrambles to Fix IE Flaw

Microsoft revealed Tuesday it was investigating a previously unknown security flaw affecting all versions of its Web browser, Internet Explorer ...

Technewsworld Channels