If you are a cloud user, your smartphone is vulnerable than most. Yes, your mobile security is once again at risk – it just never stops! The crux of this latest mobile vulnerability: residual files remain on your smartphone even after the files have been uploaded to the cloud. So what does that mean? Hackers may be able to utilize these residual files to gain access to your cloud and the files saved within it.
Since it’s launch in 1998, StarCraft has acquired quite the following. This pop-culture phenomenon can equate to six-figure salaries for the biggest players, and the live tournaments bring in crowds of thousands, on the web and live. However, millions were affected when a hack attack exposed email addresses of StarCraft players and users of other Blizzard games such as World of Warcraft and Diablo 3. Secret authentication questions and encrypted passwords were also hacked, although it is not believed that any credit card information was stolen, but users were encouraged to revise their security passwords and details on their Blizzard accounts.
It’s clear that the Surface Pro is heavier, faster and more expensive than its counterpart, proving that it’s very much an ultrabook and not a tablet. But it still has some holes.
Facebook didn’t come up with the ‘Like’ button, and that is the reason behind Facebook being sued this month. Rembrandt Social Media filed the lawsuit, stating that Facebook’s success was based on several of a Dutch programmer’s (now deceased) patents, which they now own. According to the paperwork submitted with the lawsuit, Facebook was aware of the patents for the ‘Like’ button and referenced them in their application to patent their own social networking tools.
One of the latest massive hack attacks has hit not one, but three major companies in recent weeks. The attack is believed to have come from an Eastern European hacker gang, and was apparently launched to target software vulnerabilities with the goal of stealing company secrets and users’ personal information which could be sold on the black market. The software vulnerabilities were in fact due to a well-known security hole in Oracle’s Java software.