InfoSec News

With the verdict in the Apple-Samsung trial delivered after less than three days it's tempting to think the jury just wanted to get it over with by the weekend, but that's not necessarily the case, one legal expert said Friday.
Samsung must pay Apple just over $1 billion for infringing several of its patents in Samsung smartphones and tablets, a California District Court jury decided on Friday.
Samsung must pay Apple just over US$1 billion for infringing several of its patents in Samsung smartphones and tablets, a California District Court jury decided on Friday.
Unless Hewlett-Packard gets its act together quickly, China-based Lenovo will soon become the world's number one PC maker.
The U.S. Department of Health and Human Services announced the finalization of a rule that will delay by one year the deadline for healthcare providers to implement the ICD-10 medical coding system.
Samsung makes $56 more selling each new $499.99 Wi-Fi-only Galaxy Note 10.1 tablet than Apple gets by selling the iPad for the same price.
An industry analyst firm downgraded its 2012 forecast for the global semiconductor market based on slumping economic conditions and chip revenue.
Re: [Full-disclosure] XSS and SQL Injection Vulnerabilities in Jara
Elcom CMS - Community Manager Insecure File Upload Vulnerability - Security Advisory - SOS-12-008
In the latest twist in a saga that has dragged on for seven years, a federal judge refused to set aside a $675,000 fine that a jury imposed on a former Boston University student for illegally downloading 30 songs.
Oracle is expanding its support for R, the open-source language for statistical analysis, the company announced Friday.
Re: [Full-disclosure] XSS Vulnerabilities in LabWiki
[SECURITY] [DSA 2533-1] pcp security update
[security bulletin] HPSBUX02806 SSRT100789 rev.2 - HP Serviceguard, Remote Denial of Service (DoS)
ESA-2012-039: EMC ApplicationXtender Arbitrary File Upload Vulnerability
Are the nation's LTE wireless carriers prepared for the video chat data crunch expected to come with the next-generation iPhone and other devices that are expected to launch this fall?
The social networking world may be a busy place with users loyal to their favorite sites, but Josh Miller, a co-founder of Branch, says the new network should fit right in.
Cybercriminals are trying to capitalize on Adobe's decision to stop distributing Android Flash Player to new users via Google Play by creating malware and adware apps that masquerade as Flash Player installers.
Salesforce.com's annual Dreamforce event is coming up in just a few weeks, but during Thursday's second-quarter earnings call, CEO Marc Benioff couldn't help but share some of the big announcements the cloud software vendor has planned for the show.
Anyone who's ever been late arriving home or to a meeting (and that would never be me!) will appreciate Twist, a free app by Twist and Shout. This app does one thing very well--it tracks your location and notifies those waiting for you of your estimated time of arrival. Here's how it works:
Two bug-ridden signature updates mean that, in the worst case, McAfee customers can no longer access the internet. Company and private users alike are affected

Until now, third parties had no problem reading WhatsApp users' messages on public networks. An update at least makes snooping a little more difficult

JW Player 'playerready' Parameter Cross Site Scripting Vulnerability

Posted by InfoSec News on Aug 24


By Liau Yun Qing
August 24, 2012

SINGAPORE -- IT security professionals will need to be more open to
risks with regard to mobile device management in order to support, and
not hinder, business needs. It will need close cooperation with other
departments such as legal and human resource to fulfill its role though,
one Gartner analyst says.


Posted by InfoSec News on Aug 24


By Nick Heath
August 23, 2012

Takeaway: Software makers should face legal action if sloppy coding
leads to hackers emptying users’ bank accounts, argues a Cambridge

If you’re poisoned by a burger you can sue the restaurant that sold it -
so why can’t you take a software developer to court if their negligent...

Posted by InfoSec News on Aug 24


By Elinor Mills
Security & Privacy
August 23, 2012

MOUNTAIN VIEW, Calif. -- The journey to the heart of the operation
reminded me of the late '60s TV show "Get Smart," where one heavily
fortified door leads to another locked entryway followed by more
complicated defenses in a seemingly never ending series of entry points...

Posted by InfoSec News on Aug 24


By Josh Smith
August 23, 2012

At the height of the economic crisis in 2008, Saturday Night Live’s
“Weekend Update” comedy news show rolled out the character Oscar Rogers
as a faux financial commentator. His advice on how to restore the
economy? “Fix it! It needs to be fixed! Now!”

Four years later, lawmakers are...

Posted by InfoSec News on Aug 24


By Dan Goodin
Ars Technica
Aug 23, 2012

Because of incorrect research contained in the original report, this
article previously misidentified a command and control server that was
being accessed by computers infected by the Gauss espionage malware.
Contrary to that report, the server is operated by researchers with
The Wi-Fi Alliance has launched a program to certify products that support TDLS (Tunneled Direct Link Setup), a technology that allows devices to automatically create a link between each other after accessing a wireless network, removing the need to transmit data through the access point, and avoiding delays caused by congestion.
The source code of "We The People," the online system that can be used by citizens to submit their petitions to the White House, is being offered as open source software, an official said on Thursday.
We look at a range of Bluetooth speakers that can improve your smartphone's audio at home, at work or on the go.
Growth in the PC market is expected to be slower than last year, after mid-year shipments slowed as consumers were hit by weak economic conditions, and also postponed purchases to evaluate Windows 8 and Ultrabook products as well as media tablets and smartphones, IDC said.
The Office of the National Coordinator for Healthcare IT has published the final EHR certification criteria for Stage 2 of Meaningful Use, and there was one major change, more time to meet the deadline.
Mobile payment technologies are finally vaulting forward in the U.S. after years of slow advances
PHP CVE-2012-3365 'open_basedir' Security-Bypass Vulnerability
Internet Storm Center Infocon Status