A U.S. judge has put a stamp of approval on a US$20 million fund for Facebook to settle a class-action advertising suit, despite objections from groups representing minors on the site.


A U.S. judge has put a stamp of approval on a US$20 million fund for Facebook to settle a class-action advertising suit, despite objections from groups representing minors on the site.
The opportunities in unified communications for vendors and end-users are obvious, but how can the channel cash in on this snowballing technology?

When Microsoft Chief Executive Steve Ballmer steps down in the next 12 months, his successor will be left with the …

At least three U.S. banks have lost millions of dollars after fraudsters gained control of payment applications that control wire transfers.

Cisco Systems has released new security patches for several versions of Unified Communications Manager (UCM) to address vulnerabilities that could allow remote attackers to execute arbitrary commands, modify system data or disrupt services.

As Windows 8 struggles to take off, Microsoft has decided to hire a new ad agency to handle the digital promotion of both the operating system and Microsoft Surface tablets.

After a Palestinian researcher was denied a bug bounty by Facebook, Marc Maiffret, CTO of BeyondTrust, kicked off a crowd-sourced fund yesterday to come up with a reward.

For many companies, the self-service business intelligence (BI) experience is similar to the early days of agile development. Back then, companies flocked to agile methodologies, drawn by the promise of faster delivery cycles, improved business-IT relations and expedited delivery.

Lax password implementation has meant that operational technology (OT) is now vulnerable to security attacks.

Everything you have heard about cyber security is wrong, according to Gartner VP and distinguished analyst, John Girard.

A Facebook engineer blamed language difficulties and documentation issues for a delay in fixing a bug that let a security researcher post directly to founder Mark Zuckerberg’s Timeline, which is restricted if two users aren’t friends.

Acting like a software version of a Transformer robot, a malware test app sneaked through Apple’s review process disguised as a harmless app, and then re-assembled itself into an aggressive attacker even while running inside the iOS “sandbox” designed to isolate apps and data from each other.

Chinese hackers are using an automated tool to exploit known vulnerabilities in Apache Struts, in order to install backdoors on servers hosting applications developed with the framework.

Google is upping the rewards it offers to bug hunters on its Chromium Vulnerability Rewards (VRP) program to AED 18,365 ($5000) for those previously rated at AED 3,673 ($1,000), the firm has announced.

A significant global talent shortage is looming as companies seek to leverage Big Data for competitive advantage but struggle to …

Investing in anti-virus software is no longer enough to counter cyber attacks on vital data systems, especially if national security is at stake.

Android vulnerabilities make for some of the biggest security concerns of the moment, according to Trend Micro’s Q2 2013 Security Roundup Report.

It may be old news now, but hackers are still using news of the royal baby’s birth to entice people into clicking on malicious links, according to researchers at Trend Micro.

If US intelligence agencies ban the computers of a Chinese company from classified networks should companies also avoid the same products? What if the vendor is one of the world’s largest PC makers?

The TOR Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered network.