Energy summit bods warned of free energy bonanza
British consumers could easily hack the controversial new smart meters the government plans to introduce, allowing them to illegally slash their energy bills, cyber-security experts have warned.
From espionage to cybercrime
The Sandworm vulnerability is being actively abused to attack Swiss banking customers, Danish security consultancy CSIS has warned.
WASHINGTON (AP) - The White House says it has taken steps to address suspicious activity detected on its unclassified computer network.
For those of us who follow this, this statistic isn?t surprising. It?s still scary since a lot of folks will still click on a link just to see what it is. The good news is that folks are actually getting smarter about it. Microsoft: 42% of Americ...
1 day ago This is Google's boldest search plan yetYahoo Security View Synopsis+1
Google is not done improving Search just yet - with the company interested in answering more and more complex queries in the future - but it won't just stick to providing users a tool to finding stuff online. Google X's Dr. Andrew Conrad told The Wall Street Journal at the WSJ.D conference that the company is working on a special new medical project which might allow Google to search the human body for answers to various medical conditions including cancer in the future. FROM EARLIER: The real questions Google Search wants to answer, but can't yet The company is currently developing special nanoparticles that could be sent to a patient's blood stream, and navigate it to look at the various
BEIJING (Reuters) - China's Xiaomi Inc has become the world's third-largest smartphone vendor just three years after first hitting the market, trailing only Samsung Electronics Co Ltd and Apple Inc, according to a new industry study. Strategy Analytics said Xiaomi accounted for 6 percent of all 320 million smartphones shipped during July-September. Samsung made up 25 percent, down from 35 percent a year earlier due to rising competition from several directions. Apple's share also fell slightly to 12 percent. ...
8 hours ago Share the Load to Get More DoneIT Toolbox Blogs View Synopsis+1
You are the best person to do just about any task you can imagine. I know. I am too. But sometimes it's better to share the load and work with others. They don't do it like you do, but together you'll get much more done.
A cyber espionage operation has been targeting users of Office 365's Outlook Web App.......
BETHESDA, Md., Oct. 28, 2014 /PRNewswire-USNewswire/ -- SANS Online Training announces a special opportunity to receive a new MacBook Air laptop, a Toshiba Portege Z30 laptop, or an $800 discount on online courses with SANS' top-rated cyber security training. This special offer runs through December 3rd and can be used toÂ purchase any of the 30 qualifying SANS OnDemand or vLive courses.In ...
7 minutes ago EU holds largest-ever cyber security exerciseYahoo Security View Synopsis+1
ATHENS, Greece (AP) - A European Union cyber-security agency was in Athens to conduct the largest exercise ever held on the continent to prevent attacks on Europe's public utilities and communications networks.
By Mark Hosenball WASHINGTON (Reuters) - An attack by hackers on a White House computer network earlier this month was considered so sensitive that only a small group of senior Congressional leaders were initially notified about it, U.S. officials said on Thursday. The officials said the Democratic and Republican leaders of the Senate and the House of Representatives and the heads of the Senate and House Intelligence Committees, collectively known as the "Gang of Eight", were told last week of the cyber attack, which had occurred several days earlier. ...
Largest EVER Europe-wide cybersecurity exercise
Forget cyber-espionage, cyber-warfare and cyber-terrorism. The biggest threat to Europe's infrastructure cybersecurity are power outages and poor communication.
1 hour ago Sugar CRM IntegrationIT Toolbox Blogs View Synopsis+1
Following our five part series on CRM Integration Essentials,we are looking at integration requirements for specific CRM systems in a three-part series on Salesforce CRM, Sugar by SugarCRM and Microsoft Dynamics CRM.
3 hours ago MATCH_RECOGNIZE a Stream of Employees?IT Toolbox Blogs View Synopsis+1
I'm thankful someone else did the work...
Java a hot spot - new report
UK consumer patching practices have worsened still further over the last three months, increasing the threat of malware problems, according to a new study by IT security provider Secunia.