Researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receive data through inaudible audio signals.
Botnet ‘Pony’ software steals Facebook, Google, ADP payroll processor logins
Two million logins and passwords from services such as Facebook, Google and Twitter have been found on a Netherlands-based server, part of a large botnet using controller software nicknamed “Pony.”
Microsoft’s Desktop Optimisation Pack gets Win 8.1 management capabilities
The Microsoft Desktop Optimization Pack (MDOP) suite of IT management tools has been updated with support for Windows 8.1 device and application management and Office 2013 virtualisation.
Wisconsin man fined $183,000 for Anonymous DDoS attack
A man from Wisconsin was sentenced for participating in a DDoS (distributed denial-of-service) attack by hacker group Anonymous on a Kansas company.
Google Compute Engine goes live as commercial service
After running the service in preview mode for over a year, Google is making its IaaS (infrastructure-as-a-service) Google Compute Engine (GCE) available as a full-fledged commercial service.
Apple acquires $200 million social media analytics firm Topsy
Apple has acquired Topsy, a social media analytics company that focuses on a range of data from Twitter, according to a recent Wall Street Journal report.
ECB: smartphone mobile payments present serious security risk
The European Central Bank (ECB) has warned that current smartphone operating systems represent a security risk as consumers adopt mobile payments.
Nokia targets low-end Android competitors with two new Asha smartphones
Nokia has started shipping two new low-end touch-screen phones running its own Asha software platform. It hopes they will allow it to compete more effectively with cheap Android-based products.
New Windows privilege escalation flaw exploited in active attacks
Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to.
CIOs bypassed on ‘shadow spending’
IT departments are “significantly underestimating” the budgets allocated to technology in others parts of the organisation, as more business leaders bypass the CIO and IT staff to execute their own projects, according to research.