News

Last Updated on 4 April 2014, Total: 141 Blog Posts

  1. Amazon EC2 Spotathon

    If you are a user of Amazon's EC2 Spot Instances and feels confident that you have built a cool idea using spot instances then show off your talent and try your luck at Spotathon! You could win $25,000 in AWS Credit and celebrate Cyber Monday in a spot-instance style. You simply need to say what your application does, how it... Read More

  2. 1.32 million Facebook user accounts exposed

    A Facebook flaw has made some 1.32 million user accounts accessible without using a password. A message posted to a hacker news website published a list of links that gives access to user accounts while bypassing password protections! Read more here - http://www.bbc.co.uk/news/technology-20180229... Read More

  3. The Betrayal of Wikileaks

    Hacktivists group Anonymous state that they cannot support anymore what Wikileaks has become. Read some tweets exchange between Anonymous and Wikileaks here - https://twitter.com/wikileaks/status/256208465511452672 Read Anonymous Press Release here - http://www.anonpaste.me/anonpaste/index.php?f12864c4aaa27e05#b85melA+HwnJhvVZbw93iqqnrdHJLNEJURQgWJSkAhk=... Read More

  4. Top-secret base revealed on Apple Maps

    'A top-secret base in Taiwan, revealed on Apple Maps. The Navy SEALs' rehearsal site for the Osama bin Laden raid, found on Bing. Once again, commercial satellites have snapped images of things that governments would rather hide from public view. And once again, those governments are finding that there's not much they can do once this sensitive imagery ends up... Read More

  5. Can we trust the Chinese with our critical data infrastructure?

    The Chinese world leader in fourth generation communication networks, known as 4G, sets its eye on the U.S market. This latest technology is used for high volumes of phone calls, data, and high definition video. Its innovative low cost systems have already captured markets in Africa, Latin America and Europe. Many U.S. congressional leaders and others see this move as... Read More

  6. A live MSExchange.org Webinar sponsored by KEMP Technologies

    Is your organization's network service up-to-date with the latest configuration best practices for High Availability and Load Balancing? Now is the time make sure, before you have an outage. Learn the latest from a Microsoft Exchange MVP who will help you identify where your High Availability network stands today and avoid future outages. Join J. Peter Bruzzese, Microsoft Certified Trainer... Read More

  7. Dell SecureWorks discovers another APT

    Security experts at Dell SecureWorks has been on the go discovering number of APTs (Advanced Persistent Threats) threatening various sectors such as, energy and military. This is the second cyber espionage activity that Dell's CTU (Counter Threat Unit) has discovered this year. Dell's experts have found that Mirage (latest APT) has C&C (command & control) servers IP addresses originating from... Read More

  8. Microsoft latest staff giveaway

    Microsoft announces a massive giveaway to its 94,000 employees! According to v3.co.uk each Microsoft employee would get a Surface RT tablet, a Windows Phone 8 and a Windows 8 computer, which would cost Microsoft some $100 million. It is a noble gesture by Microsoft which would not only help keeping its employees happy but it would also raise the number... Read More

  9. GoDaddy.com outage was not caused by DDoS attacks

    The global hosting service provider GoDaddy.com says that a series of internal network events has corrupted its router data tables and caused the intermittent service outages of last Monday. Go Daddy also denies claims made by hackers on Twitter that the outage was due to DDoS attacks against their services. Read the full press release here - http://www.godaddy.com/newscenter/release-view.aspx?news_item_id=410... Read More

  10. Oracle releases patch for vulnerabilities in Java 7

    Oracle has issued an out-of-cycle patch for vulnerabilities in Java 7 that have been widely exploited to spread malware. This Security Alert addresses security issues CVE-2012-4681 (US-CERT Alert TA12-240A and Vulnerability Note VU#636312) and two other vulnerabilities affecting Java running in web browsers on desktops. These vulnerabilities are not applicable to Java running on servers or standalone Java desktop applications... Read More

Featured Links