Pages

Search Technology News

Showing posts with label Web Attacks. Show all posts
Showing posts with label Web Attacks. Show all posts

Tuesday, January 25, 2011

Beware of attack tool kits from malicious websites: Symantec


The latest threat to internet users from hackers is tool kits from malicious websites that attack computers with software programmes, says global security solutions provider Symantec Corporation . Its global intelligence network has detected 240,000 attack tool kits across 200 countries.

"Attack tool kits are software programmes that infect networked computers when unsuspecting users surf malicious websites created by cyber criminals," Symantec India vice-president Shantanu Ghosh told IANS here, citing a Symantec study.

The ease with which tool kits are accessible has drawn even traditional criminals without expertise into cybercrime, fuelling a self-sustaining, profitable and organised global economy, the study by the US-based company's security technology and response unit pointed out.

"A techie who develops the kit customises the publicly available exploit code and incorporates it into the kit for setting up a malicious website, which attacks computers when viewed," Ghosh explained.

The Symantec global intelligence network, which identifies cyber threats, takes action and prevents impact, detected 240,000 attack tool kits across 200 countries worldwide in a recent survey.

"As cyber attacks have become more profitable, tool kits have become popular with newer versions. These kits are sold on a subscription-based model with updates and support services," Ghosh noted.

Monday, January 3, 2011

Web attack takes Anonymous activists offline

The notorious message board 4Chan has been taken offline by an overwhelming web attack.

Because of the attack, the discussion boards of the site have been hard to reach or offline for almost 24 hours.

The attack might be retaliation for similar attacks that some 4Chan members, as part of the Anonymous group, mounted in support of Wikileaks.

It is not yet clear who is carrying out the attacks and no-one has come forward to claim responsibility.

News about the large-scale web attack, known as a Distributed Denial of Service (DDoS) attack, came to light via a message posted on Twitter by Moot, the founder of 4Chan.

He wrote: "Site is down due to DDoS. We now join the ranks of Mastercard, Visa, Paypal, et al - an exclusive club!"

A DDoS attack involves bombarding a server behind a website with data in an attempt to knock it offline.

Many members of 4Chan work together in the guise of a group called Anonymous to carry out attacks on websites they deem to be enemies of freedom of speech.

Most recently, Anonymous members took action in support of whistle-blowing site Wikileaks. Anonymous used a DDoS tool to hit the corporate websites of Mastercard, Visa and Paypal because the firms had cut off payment connections to Wikileaks.

Paul Mutton, a security analyst at site watching firm Netcraft, said the attack on 4Chan was ongoing.

"For most of the past 24 hours, the site has either been very slow to respond or has been completely unreachable," he said.

Statistics gathered by Netcraft show 4Chan was hit hard early on Wednesday but that it recovered towards the afternoon.

A blog showing the status of the various elements of 4Chan suggests the image boards, the most heavily used part of the site, have been down for hours.

Early reports suggested that a hacktivist known as the Jester was behind the attack. Before now, some members of Anonymous said they would target the Jester with DDoS attacks after he declared an ambition to knock Wikileaks offline.

However, in a Twitter message, the Jester denied any involvement in the attack.

Disclaimer: All information on this news has been compiled from their respective official websites or through public domain sites and leading newspapers. Although, we have taken reasonable efforts to provide you with accurate information, but we assumes no responsibility for the accuracy (or inaccuracy) of the Information and would advise you to verify it from the official product provider. We cannot guarantee that the information on this page is 100% correct. If you would like to advertise on our site please contact us

Thursday, December 23, 2010

Web attacks target human rights sites

Human rights groups and campaigners are being hit hard by huge web attacks launched by those opposed to their views, finds research.Many web-based campaigning groups are being knocked offline for weeks by the attacks, it found.

The researchers expect the tempo of attacks to increase as the tools and techniques become more widespread.It urged human rights groups and independent media groups to beef up their defences to avoid falling victim.

Flash flood
The research by the Berkman Center for Internet and Society at Harvard University tried to get a sense of how often human rights groups and independent media organisations are hit by what is known as Distributed Denial of Service (DDoS) attacks.

DDoS attacks try to knock a site offline by overwhelming it with data.

In the 12 months between August 2009 and September 2010 the research found evidence of 140 attacks against more than 280 different sites. The report acknowledged that these were likely to be the most high profile attacks and that many more had probably gone unreported.

"These attacks do seem to be increasingly common," said Ethan Zuckerman, one of the authors of the report.

While some attacks were triggered by specific incidents such as elections, others had no obvious cause, he said.The report cites a sustained DDoS attack on Novaya Gazeta, the website of Russia's most liberal indepedent newspaper.

Deputy executive editor Sergey Sokolov is not certain who attacked his website but suspects government-sponsored Kremlin Youth organisations.The report finds that DDoS is increasingly being used as a political tool and as a form of protest.

Attacks that recruit participants in so-called volunteer DDoS are proving popular. The report gives the example of the organisation 'Help Israel Win' which recently invited individuals to install a software package, dubbed Patriot DDos, on their computers so the machine could be used to launch attacks, on what the authors assume would be Palestinian targets.

The most recent example of a volunteer DDoS comes from Anonymous, a loose-knit group of activisits, who used the method to launch attacks on the websites of firms it perceived to be anti-Wikileaks. DDoS attacks could hit small media groups and campaigners hard because the organisations have such limited resources, said Mr Zuckerman.

"If you are a human rights organisation or independent media organisation you might be using an account you are paying £20 a month for and its very hard at that level of hosting to fend off DDoS," he told the BBC.
The attacks did not have to be prolonged, he said, to cause real problems for small campaigning groups.

"They just have to do it long enough to annoy their ISP and they will kick them off and then they have to find another place to host," said Mr Zuckerman.

Easy tools
The work of some groups only appears on the web, said Mr Zuckerman, so knocking them offline effectively silences the campaigners. It can take a long time for some to find a new host, upload content and re-build a site.

He said: "We see sites that do not come back online for two to three weeks."The report also found that DDoS attacks are often only the most visible element of a much broader attack against a site or group.

"There's a very good chance that if you are experiencing DDoS you are being filtered, sent targeted e-mail to get access to your system or to snatch your passwords," he said.Mr Zuckerman said some DDoS attacks logged in the report used hundreds or thousands of PCs in a botnet - networks of hijacked home computers - but others had just as big an effect with far fewer resources.

"There are certain attacks that seem to work if you have only one or two machines," he said.What might cause problems in the future, he suggested, would be easy-to-use tools like those employed by Anonymous activists in support of Wikileaks.

"It seems like DDoS has become easier for more people to engage in," he said. "The threats do seem to be increasing."In response, he said, rights groups needed to work hard to understand the threats and prepare in case they were hit.

"This community needs to get much, much smarter and much more knowledgeable," he said.

Disclaimer: All information on this news has been compiled from their respective official websites or through public domain sites and leading newspapers. Although, we have taken reasonable efforts to provide you with accurate information, but we assumes no responsibility for the accuracy (or inaccuracy) of the Information and would advise you to verify it from the official product provider. We cannot guarantee that the information on this page is 100% correct. If you would like to advertise on our site please contact us

Monday, December 13, 2010

Web Attacks Test Firms'(PayPal's) Internet Defenses

The computer attacks against Visa Inc., PayPal and other companies that cut off ties with WikiLeaks are testing businesses' digital preparedness for what has become a high-stakes cyber war.
Moments after a manifesto saying "PayPal is the enemy" surfaced Sunday on blogs, PayPal's chief information security officer, Michael Barrett, moved his team "into red alert status," including at the company's operations nerve center in San Jose, Calif.
What ensued was a week-long chess game between hackers and PayPal engineers in some nine locations around the world. The attackers tried to flood PayPal.com and other sites with a surge of Internet traffic meant to overwhelm their server systems and make their websites inaccessible.
"A good chess player will typically go several half-moves ahead," Mr. Barrett said in an interview Friday. "We have counter-measures and counter-counter-measures," he said, such as shifting server resources from one part of the site to another. Amid the assault, PayPal's site has occasionally slowed down, but hasn't crashed.
By contrast, MasterCard Inc. and Visa both suffered website outages on Wednesday. The companies don't conduct business on those sites, which act as electronic brochures. Both firms said sensitive customer information and transaction processing networks were unaffected.
The attacks by a loose-knit collective known as "Anonymous" weren't a good measure of what the world's hackers can mete out on corporate sites. The attacks appear to be classic distributed denial of service (DDOS) assaults of a type that have plagued sites since almost the first days of the Web. The attacks were relatively unsophisticated.
Yet the fact that financial companies like MasterCard and Visa have left part of their operations vulnerable raises questions of whether businesses are using every tool available to them to gird for attacks from a more-sophisticated cyber army.
The cyber attacks were ongoing Friday. A prosecutors office in the Netherlands said its website had been disrupted by a denial-of-service attack, Reuters reported, a day after a teenager suspected of involvement in the attacks was arrested in the country.
On Friday, some "Anonymous" members put out an announcement saying they were shifting their strategies from attacking websites to flooding news sites and forums with interesting bits from the exposed WikiLeaks documents.
"We do not want to steal your personal information or credit card numbers. We also do not seek to attack critical infrastructure of companies such as MasterCard, Visa, PayPal or Amazon," they wrote in a statement posted online. "Our current goal is to raise awareness about WikiLeaks and the underhanded methods employed by the above companies to impair WikiLeaks' ability to function."
U.S. authorities say there are multiple probes into various aspects of the WikiLeaks case, including people responsible for leaking the documents and the recent Internet-based attacks, according to people familiar with the matter.
The Justice Department has used a grand jury in Alexandria, Va., which has jurisdiction over criminal cases involving the Pentagon, to conduct aspects of the investigations, according to people familiar with matter. It couldn't be learned what aspects of the investigation have been presented to the grand jury or whether prosecutors are moving close to making arrests.
The Federal Bureau of Investigation has investigators embedded in several police agencies around the world that are probing the cyber attacks, officials said. The FBI's role generally consists of providing Internet service provider information and other data from companies attacked. FBI investigators provided assistance in Wednesday's arrest of the Dutch teenager, the officials said.
"It is a scary reality of putting your business online that it is relatively cheap and relatively easy to mount a major attack from around the world," said Shawn White, the senior director of external operations at mobile and Internet performance monitoring firm Keynote Systems Inc.
The Web industry offers an arsenal of weapons against denial-of-service attacks, often selling them as services to corporations that can't afford to set up those technologies in-house.
Such services are often used to market the "cloud computing" industry, which urges corporations to move many of their computing tasks online to services that distribute the load across many servers, often in multiple locations.
Denial-of-service attacks are "the kind of thing that will never go away," says Rich Mogull, an analyst at research and consulting firm Securosis. But the more bandwidth a business has the less likely an attack is to succeed. Bringing down a large website like Amazon.com or PayPal isn't easy because such sites are used to dealing with large volumes of traffic.
But any slowdown has the risk to hurt PayPal's business. On Wednesday the graphic design website 99designs.com experienced a 15 to 20 minute outage in PayPal's payment service and had difficulty accepting payments via PayPal for several more hours, says its chief technology officer, Lachlan Donald.
While 99designs also accepts credit card payments, the company plans to add an additional payment option in order to buffer itself against possible future PayPal outages.
In PayPal's network operation center, charts showing total payments processed per minute and total traffic to the site, along with other data, are projected on a large, curved wall in front of around 20 workstations, each holding three to five computer monitors.
After the attacks began Monday, the line graph showing payments processed each minute dipped slightly as PayPal came under siege—signaling the website was slowing—while the neon green bar graph showing traffic to the website spiked, said Mr. Barrett.
PayPal, which is owned by and shares resources with e-commerce giant eBay Inc., was prepared. "We have made more changes in the last week than I can remember ever, simply to ensure the site is as robust as possible," said Mr. Barrett, the chief information security officer. Those include "hotwiring" the defensive layers that might get stressed. For example, the company repurposed server resources that might normally be used to redirect people who type in the company's Web address without the needed "www" at the beginning.
PayPal's information security teams work on a global basis, handing off tasks between places as far apart as Tokyo and Dublin. "We made some changes last night that didn't work as we wanted," said Mr. Barrett. "The team in Chennai was able to fix them," while teams in the U.S. focused on other issues, he said.
On Friday morning, even as the attacks continued, the key charts had returned to their typical levels, signaling that PayPal's defensive layers were successfully deflecting unwanted traffic, said Mr. Barrett, who has been working 18 to 20 hours a day this week.
Both Visa and MasterCard were skittish about saying why the attacks hobbled their sites more than PayPal and Amazon, or what they are doing now to prevent such a disruption from occurring again.
"We're not commenting on technology questions," said a MasterCard spokesman. Visa declined to comment.
Raj Chaudhary, who leads the security and privacy practice at consulting firm Crowe Horwath LLP, said the unknown question about Visa and Mastercard is whether they had plans in place to thwart an attack. Most companies, he added, still have not constructed adequate defenses even after a decade of intermittent disruptions to Internet commerce.
The events of the last week have prompted new requests from clients to put together a new defense. Mr. Chaudhary said, companies want to know, "How can I assure I don't become Visa."
Disclaimer: All information on this news has been compiled from their respective official websites or through public domain sites and leading newspapers. Although, we have taken reasonable efforts to provide you with accurate information, but we assumes no responsibility for the accuracy (or inaccuracy) of the Information and would advise you to verify it from the official product provider. We cannot guarantee that the information on this page is 100% correct. If you would like to advertise on our site please contact us

Chitika

Tags

.xxx domain (1) 'super' computer (1) `Bionic eye` (1) `Sparsh` (1) 000 toxic chemicals (1) 10 (1) 100 tablet launches (1) 19 near-Earth asteroids (1) 29 websites (1) 3-D films (1) 3-D holographic video (1) 3-D TV (1) 3D cameras (1) 3D microscope (1) 3D tablet (1) 3D TV (1) 3G connection (1) 3G Plans (1) 3G/ 4G technologies (1) 4G (1) 4G tablet (1) A19 LEDs (1) Acer (2) Acer CEO (1) Aegis (1) Agni-III (1) Air laser (1) Air Liquide (1) Airtel (1) Alternative Fuel Technology (1) Alzheimer's detection (1) Amazon (1) AMD (4) AMD flagship hexa processors (1) Android (7) Android Dual SIM (1) Android and BlackBerry (1) Android and Symbian Apps (1) Android e-reader (1) Android phones (3) Android Price Wars (1) Android software (1) Answer engines (1) Anti-virus (2) apan (1) APJ Abdul Kalam (1) App (1) APP STORE (1) Appia (1) Apple (38) Apple and Google (1) Apple App Store (1) Apple CEO Steve Jobs (1) Apple Control (1) Apple iOS 4.3 (1) Apple iPad (6) Apple iPad 2 (2) Apple iPhone (2) Apple iPhone 4 (1) Apple iPhone 4 Moblie (1) Apple sues Amazon.com (1) Apple tablet (1) Apple's App (2) Apple's E-Books (1) Apple's iOS (1) Apple's iPad (3) Apple's iPad 2 (3) Apple's iPad2 (1) Apple’s iPhone (1) Apple's Jobs (2) Apple's new iPad (1) Apple's sales Mystery helps (1) Apps (1) apps for iPad (1) April Fool's (1) AT and T (4) AT and T Buys T-Mobile (1) Bacteria-free (1) Bans users (1) Battery (1) Bell (1) Big Bang (1) Big threat (1) Bing (2) Bing Search (1) Black Hole (1) BlackBerr (1) BlackBerry (14) BlackBerry app (1) BlackBerry Bold 978 mobile phone (1) BlackBerry Messenger (1) BlackBerry PlayBook tablet (1) BlackBerry tablet (2) Blackberry thumb (1) blind (1) Bloggers (1) Blood chip (1) Bluetooth (1) Bombs (1) Breath test (1) British mobile internet (1) Broadband (1) Browsers Hackers (1) Browsers' life public (1) Budget (1) Bug (1) Bullet Train (2) Bureau of Energy Efficiency (BEE) (1) Buzz cash (1) Cablevision (1) Camera (1) cameras (1) Canada cyber attack (1) Canon EOS Rebel T2i camera (1) Caparo India (1) car (1) Car reads emails (1) Cards (1) Cell Phone (3) Cellphone (1) Chairman J.T. Wang (1) Charge cell phones (1) Cheap (1) check pulse (1) China (12) China GPS (1) Chinese Supercomputers (1) Chinese voices (1) Chip (1) Chips Makers (1) Chrome (2) CIA New website (1) Cloud Computing (1) cockpits (1) College Admissions (1) communication (2) Computer commands (1) Computers (4) Confess via iPhone (1) costlier (1) credit card (1) Credit Suisse (1) Cricket (1) Cricket with music service (1) Crowdsourcing (1) CSS Corp (1) Cyber attack (1) Cyber attacks (2) Cyber crimes (1) Cyber criminals (1) Cyber Sunday (1) Cyber Threats (1) Cyber warriors (1) Cyber world (1) Cyber-warfare (1) Cybercrooks (1) Data transfer (1) Day and night equal (1) Defaced Govt Websites (1) delete drunken message (1) Dell (5) Dell XPS laptops (1) Denmark (1) detect LPG gas leaks (1) Device (1) Diagnoses diseases (1) Digital Camera (1) Digitized (1) Disaster alert app (1) discovered (1) Discovery (2) Disposable cameras (1) DJ Kadhafi (1) DNA (1) Documents go online (1) Dreampark (1) DSLR (1) e-commerce (1) E-Waste (1) E7 smartphone (1) EADS (1) Earth-observation satellite (1) Earth's data (1) Earth's value (1) Earthquake (1) Earthquakes (1) Eclipse Live Online (1) Eco-friendly cars (1) Egypt (4) Egypt govt (1) Egyptian protesters (1) Einstein (1) electricity (1) Electronic rickshaw (1) elite (1) Email (1) Emails (1) Endeavour (1) energy efficient (1) EU (1) EU competition complaint (1) European Broadband (1) Everio GZ-HM340 Handy Camera (1) Ex-Apple (1) ex-boyfriends (1) Expired Tablet (1) extraterrestrials (1) FaceBook (69) Facebook crime (1) Facebook discount service (1) FaceBook News (2) Facebook Samaritans (1) Facebook Third Party Commenting Platform (1) Facebook updates (1) Facebook's mobile phone (1) Fake A/Cs of Sonia (1) FarmVille's new offering (1) fingerprint (1) fingerprints from fabric (2) Firefox (2) FireFox Mozilla (1) Force10 (1) France fines Google (1) Fuel consumption (1) Fusion processor (1) Future electric cars (1) Gadget (2) Gadgets (4) GadgetTrak (1) Galaxy (1) Game (1) game changer (1) Game download (1) Games (2) Gartner (1) geek. Google Boss (1) Genetic testing (1) GLONASS (1) Gmail accounts (2) Gmail data safe (1) Gmail Motion (1) Gmail service (1) Google (79) Google accuses Chinese government (1) Google Android (1) Google apps (1) Google books settlement (1) Google Bookstore (1) Google Buzz (3) Google Chrome (3) Google Circles (1) Google Earth (2) Google Inc. (1) Google Maps (1) Google Search (3) Google Searches (1) Google subscription service (1) Google TV (1) Google Virtual Museums (1) Google vs China (1) Google-Facebook takeover (1) Google.Groupon (1) Google's 3D browser (1) Google's Android (2) Google's Android operating system (1) Google's Cloud (1) Google's new phone (1) Googleganger (1) Government (1) Greatest spying machine (1) Green Parrot (1) GSAT-5P (1) GSLV failure (1) GSLV-F06 (1) hack-free software (1) hackers (2) Hadron Collider (1) HCL Infosystems (1) HCL Laptop (1) HCL staff left Japan (1) HCL Tech (1) HCL Technologies Japan (1) heartbeat (1) Helmet Gadget (1) Hi-tech (1) High-capacity (1) High-end gadgets (1) High-tech hairnet (1) Hire (1) Hitachi (1) Hong Kong (1) Hotmail (2) HP (2) HP PalmPad tablet (1) HTC (4) HTC 5 smartphone (1) HTC 7 Mozart (1) HTC Desire HD (1) HTC Incredible S (1) HTC Mobile (1) HTC Unveils Desire Z (1) HTTPS (1) Human tissue (1) human-shaped mobile phone (1) Hydrogen storage (1) IAF (1) IBM (3) iGate-Apax (1) India (1) Indian (1) Indian IT companies (1) Indian IT in 2011 (1) Indian IT sector (2) Indian techies (1) Indian-led company (1) Information and CommunicationTechnology industry (1) Information technology (1) Infosys (2) Infy (1) Ink-jet printers (1) innovation (1) Intel (11) Intel chip (2) Intel Insider (1) Internet (12) Internet addresses (1) Internet Explorer 9 (1) Internet protocol (1) Internet services (1) Iomega ScreenPlay TV Link MX HD (1) IP addresses (2) iPad (18) iPad "Galaxy Tablet" (1) iPad 2 (3) iPad 2 price (1) iPad app TV (2) iPad Apps and Android (1) iPad hacking (1) iPad newspaper (1) iPad's Price (1) iPad2 (1) iPads App (1) iPhone (17) iPhone 3GS (1) iPhone app (5) iPhone Mobile (1) iPhones (1) iPhones App (1) iPod (1) iPods (1) IPTV software (1) Iran (1) IT investment (1) IT trade fair (1) ITA Software (1) Itanium processor (1) Japan (5) Japan disaster (1) Japan disaster donators (1) Japan earthquake (1) Japan plant Blast (1) Japan quake (3) Japan's DoCoMo (1) Japan's N-reactors (1) Japanese phone (1) JooJoo Tablet PC (1) Kindle (1) Kindle for BlackBerry (1) Kodak (1) laptop (1) laptops (3) Larry Page (1) Laser (1) Laser diodes (2) laser sensing technology (1) Lava (1) LAVA A9 Mobile (1) LED (1) lemon (1) Lenovo (5) Lenovo launches new PCs (1) LePad tablet (1) LG (5) LG GD880 (1) LG Mini (1) LG Optimus (1) LG Optimus 2X (1) LG's tablet (1) Life capsule (1) LinkedIn (2) LMZ12003 (1) lunar eclipse (1) M-E crisis (1) MacBook (1) MAFIA II Game (1) Magic cap (1) Malicious attack (1) Malware (1) Managing traffic (1) Map application (1) market value (1) McAfee (3) Meego phone (1) Memory chips (1) Mercury (1) Message (1) micro-blogs (1) Microblogs (1) microchips (1) microcontroller development (1) Micromax (1) Microsoft (34) Microsoft web browser (1) Microsoft Window (2) Microsoft Windows Phone 7 (1) Microsoft's Kinect (1) million Web pages (1) MindTree (3) MIT (1) Mobiado 712ZAF (1) mobile (2) Mobile ads privacy concerns (1) Mobile airwaves (1) Mobile app (3) Mobile apps (1) Mobile battery (1) Mobile browsers (1) Mobile Fair (1) Mobile iPhone (1) Mobile Makers (1) Mobile News (1) Mobile Nokia N8 (1) Mobile payment technology (1) mobile phone (2) mobile phone charger (1) Mobile Phone Samsung i5700 (1) Mobile phones (1) Mobile software (1) mobile system (1) mobile tech (1) Mobile to pay (1) mobile wi-fi device (1) Mobile-App (1) Mohali (1) Money transfer business (1) Monster.com (1) Morpho (1) Motorola (5) Motorola Xoom (1) Motorola Defy (1) Motorola Droid X Mobile (1) Motorola Mobile (2) Motorola Tablet (1) MOTOROLA XT800 (1) Mozilla (1) Mozilla Firefox (1) MP3 (1) MS Office (1) MS Office web apps (1) MS Windows (1) MSI U160DX (1) MSI Wind U135 Laptop Review (1) MTS (2) multi-million dollar contract (1) Multimedia (1) Murdoch's iPad (1) MySpace (1) Mythology (1) N-contaminated (1) Nanoscale whiskers (1) NASA (7) NASA's Endeavour (1) Navigation charts (1) Nehru Place (1) NeST Software (1) Netbook makers (1) New app (1) New cheapest iPad (1) New device (1) New iPad app (1) New social networking (1) News (4) News Corp (1) News industry (1) Night Sky (1) Nintendo (1) Nintendo's 3DS (1) Nobel Peace Prize (1) Nokia (20) Nokia 5233 (1) Nokia 6600i Mobile (1) Nokia and Microsoft (1) Nokia E7 (3) Nokia jobs (1) Nokia N97 (1) Nokia software (1) Nokia Windows phone (1) Nokia X5 (1) Nokia X7-00 (1) Nokia's Microsoft alliance (1) Nokia's smartphone (1) Nokia's Symbian (1) Notebook (1) NSA (1) Nuclear technology (1) NZ quake (1) Obama (1) Olive (1) Olive Nexus VR-9 (1) Online Fight Against Terrorism (1) online game (1) Online gaming (1) Online health (1) Online image editing (1) Online orders (1) Online social game (1) online stores (1) online users (1) Opera (2) Opera 11 (1) operating system (1) operating systems iOS and Mac OS X (1) Oracle (1) orbit (2) Outsourcing (1) Overweight (1) Ovi Store (1) Pad App (1) PALRO Humanoid Robot (1) Panasonic (2) Panic button (1) Parrot (1) PayPal (1) PC (2) PC market (1) PCs (1) Phone (2) Phones (2) Photos (1) pineapple (1) Piracy (1) PlayStation (1) PlayStation app for iPhone and Android (1) Popular Language (1) Power Ministry (1) Privacy breach (1) PS1 telescope (1) PS3s seizure (1) Quake (1) Quake-hit Japan (1) Qualcomm (1) Quantum computers (1) Quash Cyber Crimes (1) recharge (1) recruit (1) Reliance Communications (1) retinitis pigmentosa (1) Review (1) RIM (10) RIM's PlayBook (2) Rising Costs (1) Robot (1) Robot system (1) Robotic Hand (1) Robots (1) Rocket (1) RSS wallpaper (1) Russia (1) Russian (1) Russian satnav (1) SAIC's energy technology (1) Saline wipes (1) Samsung (9) Samsung tablet computer (1) Samsung Galaxy S Android 2.2 (1) Samsung Galaxy Tab 10.1 (1) Samsung Galaxy Tab Mobile (1) Samsung Wave II (1) Samsung WiFi Camera (1) Samsung's Galaxy Tab (1) Samsung's ultra-slim notebook (1) SATA (1) satellite (1) satellite in space (1) Sci-Tech (3) Scientists (2) Second generation processor (1) send ambulance (1) Sensors (1) severe health hazard (1) skin (1) skin cancer (1) Skype (6) smart and sleek in 2010 (1) Smart Browsers (1) smart house (1) smart phone (1) Smart phones (1) smarter phones (1) Smartphone (1) Smartphones (10) Snaptu (1) Social Media (2) Social network (2) Social networking (2) Social networking sites (2) Software (4) software for mobile payments (1) software for police (1) Software Technology Parks (1) Solar car (1) Sony (5) Sony Alpha SLT-A33L (1) Sony Ericsson PlayStation phone (1) Sony Ericsson Xperia (1) Sony Q3 (1) Soota (1) space (1) Space shuttle Discovery (1) Spacecraft spies (1) Spacecraft Stardust (1) Spain (1) Spam e-mail (1) Spam emails shut down (1) spy (1) stand-alone reset timers (1) Stanford (1) Star Wars helmet (1) Star Zynga (1) Street View (1) Strong IP (1) Study (1) Super Mario Game (2) super-fast quantum computer (1) Super-tablets (1) Supercharging (1) supernova (1) SuperSpeed USB (1) Swipe (1) Swiss court (2) Symantec (1) Symbian (2) T-Mobile (4) Tab race (1) Tablet (5) tablet apps (1) tablet boom (1) Tablets (4) Taiwan fair (1) Taiwan research (1) Taiwan's Acer (1) Talking Car (1) TCS (2) Tech Fair (1) Tech Initiatives (1) Tech sharing (1) Technology in 2011 (1) Technology research (1) Telepresence (1) The Electronic Privacy Information Center (EPIC) (1) The Flying Car (1) Time machine (1) TinyHippos (1) TOI (1) Toshiba (3) Tostitos (1) touch screen (1) Track heart-attack damage (1) Tracking device (1) Traffic jams (1) Transcend RAM (1) TRANSPARENT CEMENT (1) Trojan horses (1) Tsunami alert (1) Tsunami alerts (1) TV (2) TVs (1) Twitter (30) Twitter data (1) Twitter workaround (1) Twitter-WikiLeaks case (1) U.S. sellout (1) UberMedia apps (1) UK (1) Ultrafast broadband (1) Unique identity people (1) up (1) US (2) US face cyber attack (1) US networks (1) USB drive (1) used iPads (1) UV gadget (1) V-Day computer viruses (1) VeriFone Systems (1) Verizon (1) Verizon iPhone (4) Verizon new iPhone (1) Verizon Wireless (3) Verizon Wireless iPhone (1) Verizon Wireless Mobile (1) Viacom vs Youtube (1) video games (3) Violation complaint (1) virtual (1) virus (2) Virus hacks (1) Viruses (2) Vision (1) Vodafone (2) Vodafone's Cheapest Mobile (1) Voice-based browse (1) Vscan (1) Walt Disney (1) water (1) weathers (1) web (1) Web Addresses (1) Web Attacks (4) Web search (1) Web Telephony (1) Websites (1) Weed-eating fish ke (1) Wi-Fi (1) Wi-Fi router (1) WiFi hotspot with 3G (1) WikiLeakes (10) WikiLeaks (12) WikiLeaks case (1) WikiLeaks probe (1) Wikipedia (4) Windows 7 (1) Windows 8 (1) Windows phone (1) Windows Phone “Mango” (1) Windows Phone 7 (1) Windows Phone software (1) Wipro (2) Wireless (1) Wireless service (1) WLED LED (1) World Cup (2) world's finest museums (1) world's largest rocket production base (1) World's Smallest Computer (1) worldwide reaches (1) wrinkles (1) WWW2011 (1) X6 Mobile (1) Xbox 360 (1) Yahoo (3) YouTube (4) YouTube movie (1) zombie ant (1) ZTE (1) Zune player (1) Zynga (1)