Stolen D-Link Certificate Used to Digitally Sign Spying Malware

Digitally signed malware has become much more common in recent years to mask malicious intentions. Security researchers have discovered a new malware campaign misusing stolen valid digital certificates from Taiwanese tech-companies, including D-Link, to sign their malware and making them look like legitimate applications. As you may know, digital certificates issued by a trusted certificate…

Gradient review – Macworld UK

Gradient review Gradient is a cheap and cheerful program for creating CSS3 colour transitions. These can be used for page backgrounds, buttons and other block elements on your website. Web design has come a long way from the days when animated GIFs and blinking text were de rigueur. Developers have much more control over the…

7 Ways to Optimize Your WordPress Website

October 14, 2015 4 min read Opinions expressed by Entrepreneur contributors are their own. WordPress is considered an excellent platform for budding entrepreneurs to create websites for their startup or small business. This content management service (CMS) is used by millions of business owners who live in every corner of the world. More than 400 million websites…

As facial recognition technology becomes pervasive, Microsoft (yes, Microsoft) issues a call for regulation – TechCrunch

Technology companies have a privacy problem. They’re terribly good at invading ours and terribly negligent at protecting their own. And with the push by technologists to map, identify and index our physical as well as virtual presence with biometrics like face and fingerprint scanning, the increasing digital surveillance of our physical world is causing some…

Gaza Cybergang Returns With New Attacks On Palestinian Authority

Security researchers from Check Point Threat Intelligence Team have discovered the comeback of an APT (advanced persistent threat) surveillance group targeting institutions across the Middle East, specifically the Palestinian Authority. The attack, dubbed “Big Bang,” begins with a phishing email sent to targeted victims that includes an attachment of a self-extracting archive containing two files—a…

Sandvox 2 review – Macworld UK

Sandvox 2 review Do people still build static websites? If they do, we have a feeling they might use tools like Sandvox. This template-based, drag-and-drop driven tool’s no Coda or Dreamweaver. Think iWeb and you won’t be far wrong. Think “even more simple to use than iWeb” and you’ll be spot on. The workflow gently steers…