Sorry, you need to enable JavaScript to visit this website.

Feed aggregator

Lancashire Police warn of malware email impersonation scam

El Reg - Thu, 22/10/2015 - 8:33am
Don't open virus-riddled emails purporting to be from your local friendly bobby

Lancashire Police are warning ordinary folk not to open phishing email purporting to be from the plod.…

Laid-off IT workers: You want free on-demand service for what now?

El Reg - Thu, 22/10/2015 - 8:02am
Zombie programmers awaken ... and they're pretty tetchy

Updated  Some HR person at Atlanta's SunTrust Banks has come up with what they genuinely believe is a clever idea – after dumping 100 of its IT staff, the billion-dollar financial institution is requiring them to remain available to help out for free for two years.…

Anons blow Japanese airports off-course in dolphin cull protest

El Reg - Thu, 22/10/2015 - 7:27am
Flipper heck!

Hacktivist collective Anonymous knocked offline two of Japan's busiest websites in a protest against dolphin killings.…

DARPA Program Targets Image Doctoring

Slashdot - Thu, 22/10/2015 - 7:01am
coondoggie writes: It isn't hard for just about anyone to change or alter an image these days — and that can be a problem. It's an issue researchers at the Defense Advanced Research Projects Agency want to put to rest with a new program called Media Forensics, or MediFor, which looks to build an algorithmic-based platform that can detect image manipulation. "The forensic tools used today lack robustness and scalability and address only some aspects of media authentication; an end-to-end platform to perform a complete and automated forensic analysis does not exist. Although there are a few applications for image manipulation detection in the commercial sector, they are typically limited to a yes/no decision about the source being an "original" asset, obtained directly from an imaging device. As a result, media authentication is typically performed manually using a variety of ad hoc methods that are often more art than science, and forensics analysts rely heavily on their own background and experience," DARPA states.

Read more of this story at Slashdot.

C# biz Xamarin fancies a change, sinks fangs into Java upstart RoboVM

El Reg - Thu, 22/10/2015 - 6:54am
Cross-platform mobile development business now pitches to Java developers

Xamarin, the company co-founded by Mono inventor Miguel de Icaza to enable cross-platform mobile development with C#, has acquired RoboVM.…

Security researchers face wrath of spy agencies

El Reg - Thu, 22/10/2015 - 6:33am
Academics deported, harassed, have contracts and clearances shredded after spookwork

Researchers tasked with revealing attacks by intelligence agencies are being harassed, locked out of tenders, and in some cases deported, Kaspersky researcher Juan Andrés Guerrero-Saade says.…

'Death star' reaches out invisible hand, rips planet apart

El Reg - Thu, 22/10/2015 - 6:05am
Kepler K2 mission spots distant planetary death throes

Pity the latest planet spotted by NASA's K2 (the re-birthed Kepler) mission: boiled by starlight from its host, WD 1145+017, and racked by gravity, it's only got a million years left.…

Microsoft re-writes the cloud service playbook

El Reg - Thu, 22/10/2015 - 5:32am
Old Azure storage APIs stay. So what happened to the 'one codebase for every user' idea?

Microsoft has extended the time it will support some of Azure's early cloud storage APIs.…

Paris bins banlieue bit barn because cloud is too loud

El Reg - Thu, 22/10/2015 - 5:02am
Interxion struggles to turn City of Light into City of Byte

Interxion will have to launch an appeal in France if it's to save a €130m-plus data centre in Paris.…

Oracle Fixes Java Vulnerability Used By Russian Cyberspies

Slashdot - Thu, 22/10/2015 - 4:31am
itwbennett writes: Oracle said that it has fixed 154 security flaws in Java and a wide range of its other products, including one that Russian cyberespionage group Pawn Storm used to launch stealthy attacks earlier this year. The vulnerability, tracked as CVE-2015-4902, was being used by the Pawn Storm attackers to enable the execution of a malicious Java application without user interaction.

Read more of this story at Slashdot.

Brocade targets mobile operators with net monitor suite

El Reg - Thu, 22/10/2015 - 4:29am
"Tap" can follow the workload with very low latency

Brocade has announced a network monitoring and management solution it hopes will attract the eye of LTE network operators.…

Dell looks to become 'enterprise solutions powerhouse' with raft of products and services

L'Inq - Wed, 21/10/2015 - 7:39pm

Outlines a number of changes to help businesses make their IT strategies "future ready"

Syndicate content