A researcher has shown how to exploit a Google Android vulnerability to steal data from users
2011
Britain Keeps Quiet About Data Protection Day
Friday was European Data Protection Day. Well, did you notice?
European Project Keeps Personal Details Private
The EU-backed ABC4Trust scheme stops users over-sharing on websites
Daily iPad Newspaper Slated For February Launch
The iPad-only newspaper, the Daily, will launch from 2 February at a cost of 62 pence a week
Intel Looks To Data Centre Networking With FCoE Stack
Intel is looking to drive the migration of a single data centre network infrastructure with its Open FCoE
Big Names Missing From Top Smartphone Rankings
Motorola, RIM and HTC are notable absentees from IDC's top five rankings of mobile phone makers
Nokia Boss Hints At Android Or Phone 7 Move
Stephen Elop says Nokia may need a new ecosystem... Android, or Windows Phone 7?
Nokia Siemens Networks To Upgrade O2 Network
Nokia Siemens Networks has been selected to upgrade O2's mobile network in the south of England
Egyptian Revolt Unquelled By Total Comms Blackout
Within hours, Egypt was isolated from the outside world as the comms infrastructure was completely kettled
FBI Issues 40 Warrants Over WikiLeaks
The FBI has taken action over Anonymous DDoS attacks that supported WikiLeaks
LinkedIn To Go Public In £110m Flotation
LinkedIn has filed for an initial public offering, potentially paving the way for Facebook, Twitter and Groupon
Healthcare Firm Hit With Software Piracy Fine
The Business Software alliance has settled with Leicester firm OCB Media Limited for over £19,000
Google’s New CEO Needs To Find His Mojo
Someone has got to help Google's Larry Page exude the qualities implied by the "E" in his new/old title of CEO, says Tony Kontzer
VMware Partners Shavlik For SMB SaaS Services
The cloud platform includes patch management aimed at securing SMBs virtual and physical infrastructures
Microsoft Sues to Stop Exec Defecting To Salesforce
More conflict as Microsoft again moves against Salesforce.com, this time to stop a former executive from signing up
Tax Filing Deadline Fuels Phishing Fears
Taxpayers under pressure to file online before Monday's deadline may fall prey to scams
ASA To Investigate Phony ISP Claims
Time is up for claims like 'up to' and 'unlimited', says advertising watchdog
Malware Attackers Use Social Sites As Control Centres
Sophisticated malware attackers increasingly use services and social networking sites for control operations
Security B-Sides Show To Rival Infosec London
Could the second day of London’s Infosec show be hijacked by an indie competitor?
WikiLeaks ISP To Circumvent Data Retention Laws
Wikileaks ISP Bahnhof will anonymise all traffic by default to render Swedish data retention laws "toothless"
Microsoft Revenues Hold With Kinect And Windows 7
Microsoft posted stronger quarterly revenues than expected but still faces challenges with its online services
Samsung To Reveal Galaxy Tab 2 AT MWC
Samsung's next generation Galaxy Tab and S2 smartphone will be revealed at Mobile World Congress, it seems
Android Manager Unhappy With App Purchases
Google's Android head is not happy with the progress of purchases for paid Apps in the Android Market
ISOC Tells WEF: No Quick Fixes For Safer Internet
The Internet Society's CEO will warn the World Economic Forum against a "knee-jerk" Internet security fix
Intel Pledges £62 Million For University Research
Intel is flexing its financial muscle with the news that it will invest £62 million for university research projects
Questions Remain Over Windows Phone 7 Sales
Millions of Windows Phone 7 handsets have been shipped but actual sales figures remain hard to find
Facebook Refutes HTC Phone Claims
Facebook is not working on a branded phone with HTC – despite earlier rumours
Police Collar Five Suspects Over Wikileaks Hacks
Police have arrested five people suspected of being involved in the Anonymous DDoS attacks
How To Automate IT Service Delivery
Automated IT service delivery can be crucial to provisioning resources, helping to fulfil strategic, operational and tactical demand
Zen And The Art Of Disaster Recovery
Andy Walsky suggests eight steps to enlightened data, and explains how IT managers can achieve the perfect yin and yang