Analysts say Samsung Edges Apple for #1 Ranking

ABI Research’s Enterprise Smartphone vendor matrix concluded that, overall, Samsung is number one followed closely by Apple, with BlackBerry rounding out the top three. The vendor matrix ranks companies based on scoring in Implementation and Innovation categories.

RSA didn't let the NSA in through the backdoor

The RSA has angrily denied a claim that it secretly took $10 million from the NSA to use the buggered up Dual Elliptic Curve Deterministic Random Bit Generator in its encryption products.

British government porn filters block tech sites

It is just as we predicted, British Prime Minister, David Cameron's wonderful "save the children" porn filter is just another attempt by the Tories to prevent people finding out information.

Lini is a Haswell PC for Linux

 (or Windows)

The Lini PC is a small desktop computer with an Intel Haswell processor. The system is designed to run either Xubuntu 13.10 (Linux) or Microsoft Windows 8.1 Pro.

Will Facebook video ads turn off users?

Facebook recently unveiled a new feature for advertisers: video ads that autoplay in select users' News Feeds. It started with ads for the teen dystopia movie Divergent. But, users are not as happy as advertisers. 

Target credit card data theft gets worse

  Any way you cut it, this is a bad situation for Target's shoppers and the company itself, and I don't see how it gets any better right now. The latest from Krebs, who broke the story in the first place, will blow your mind.

Does the IRS know how to tax Bitcoins?

It's someone's money and the IRS wants its cut. However, it doesn't seem like anyone knows how virtual currencies are going to be handled by the tax authorities.

Instagram ads work as long as they include ice cream

It is on a blog post on Instagram so, you can't deny them the self-serving endorsement of their own product. Instagram's ad people are happy with results for Levis and Ben & Jerry's ads. so far. Who doesn't love Levis and Ben & Jerry's, Instagram?

Big brand tablet installed base to surpass 285 million by year’s end

Tablets have been on the top of many wish lists since 2010 when Apple launched its first iPad device. The installed base of big brand (Apple, Samsung, etc.) media tablets is expected to surpass 285 million units at the close of 2013.

Apple tells developers, use iOS 7 or else!

Imagine what would happen if Microsoft told all of its developers to use Windows 8 only. There'd be an eruption. 

Two researchers send a text message using vodka

Two researchers at York University have worked out a way to communicate between two points using vodka evaporated into the air.

Revive Adserver (formerly OpenX) zero-day actively exploited in the wild

A zero-day vulnerability that allows attackers to gain back-end access to popular open-source advertising server OpenX Source has been discovered by Florian Sander, founder of the continuous checklist tool Checkpanel.

Code-busters lift RSA keys simply by listening to the noises a computer makes

Un-named PC maker sought help to defeat un-named nation's PC-bricking plan In theory - Obama government granted time to fight injunction Chinese firm will still clear critical Brit networking gear, but team to be of UK's choosing Texts 'designed' to look like they were 'from a friend' - complaints Security upstart claims it's found a file-gobbling nasty with weak encryption Computer scientists have shown how it might be possible

Target hack: how to know if it hurt you (Updated)

By now, everyone knows that if you shopped at Target and paid by credit card between November 27 and December 15, 2013, you may be vulnerable and a victim of this humongous breach of security.

ZeroAccess criminals wave white flag: The impact of partnerships on cybercrime

The following is a post from Richard Domingues Boscovich, Assistant General Counsel, Microsoft Digital Crimes Unit.Two weeks after Microsoft filed its civil case in the U.S. District Court for the Western District of Texas against the notorious Sirefef botnet, also known ZeroAccess, I am pleased to report that our disruption effort has been successful, and it appears that the criminals have abandoned their botnet.

How a Hacker Compromised a Server in Under Four Hours

In September 2013, we ran a live server exploitation exercise to see how long an unpatched and minimally configured cloud server instance could survive against financially motivated attackers when connected directly to the Internet. The exercise, referred to as The Gauntlet throughout the capture-the-flag-style contest, ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.

Miss Teen USA exposes Apple Macbook camera security fail

The fruit themed toymaker Apple's legendary sloppy security has been brought into the spotlight again after it was revealed that you can turn on the laptops camera without the owner knowing.

LG debuts Chromebase AIO

LG has unveiled an all-in-one PC running Google's web-centric Chrome operating system (OS). Dubbed Chromebase, the system will be showcased at CES 2014 this January in Las Vegas.

Does Microsoft fear Google's Chromebooks or the people who buy them?

Microsoft never liked Larry Ellison's network computers. Clinging to that orthodoxy risks another mis-step.

Stock exchanges of the world band together to repel cyber attacks

The World Federation of Exchanges (WFE) announced the launch of the exchange industry’s first cyber security committee. The committee is tasked to combat systemic cyber abuse against world capital markets.