Using Twitter, Justin Timberlake promoted a video previewing the new Myspace earlier this week. The video shows off a splashy new social networking site loaded with images and video. At the same time, it has intelligence, good organization, and the numbers behind it to make Myspace engagement useful. It looks a little like Pinterest and Tumblr but all strung together to be a … [Read more...]
Microsoft Office 2010 won’t start and uninstall blames legacy Groove software
I encountered a client's computer that would not start up any of the Microsoft Office 2010 components. For each application (Word, Excel, Powerpoint, Publisher, etc.), a different error message might be given. Finally, it was decided that an uninstall/reinstall would probably be for the best. Unfortunately, upon trying to uninstall the application, I received an error … [Read more...]
Sophos false positive quarantines itself with Shh/Updater-B detection
In the accelerating race against viruses and malware, a trade-off we are seeing more frequently are the false-positives. Companies like Avast, McAfee, and others have all experienced them and last week was Sophos' turn. The company's anti-virus software would report that "'Virus/spyware' Shh/Updater-B has been detected and moved to quarantine" on Windows computers. … [Read more...]
Fix blank icons in the notification area on Windows 7
I encountered a PC earlier this week where the notification area was full of blank icons. It acted like it had icons in the system tray but they didn't react to clicks or right-clicks. It wasn't that alarming when the notification area was collapsed but when it was spread out on the task bar, it certainly looked odd. … [Read more...]
Mobile Pwn2Own 2012 shows Galaxy S III and iPhone 4S hack
At the EUSecWest 2012 conference, a Mobile Pwn2Own is taking place to test vectors on smartphones mobile web browsers, operating systems, NFC, SMS, and cellular baseband. Prizes are offered to the security researchers able to compromise the device. They will be rewarded with a cash prize and the device itself. A successful attack against these devices must require little or no … [Read more...]




