Many IT security vendors have a minimal understanding of industrial control systems (ICS) and try to sell technology that could easily damage the devices found in plants running the nation’s critical infrastructure, experts say. In ...
Tags: Applied Control Systems, CNME, computer news middle east, congress
A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local in-browser attacks to steal their credentials, according to researchers from security firm Trusteer. Citadel is a ...
Tags: Payza, Payment Platform, Computer Products
Twitter, in a much-needed move to keep its users safer from cyberattacks, is introducing a more secure login process. The system, called Login Verification, gives users the option to have a verification code sent to their mobile phone ...
Tags: Twitter, Sign-in, Computer Products
Twitter will offer users two-factor authentication when they sign in as "a second check to make sure it's really you". Twitter is stepping up its security measures following a series of high-profile breaches by hackers hitting media ...
Tags: Twitter, Double Sign in
Andy Kemshall, co-founder and technical director at SecurEnvoy, speaks up about voice recognition as a security tool Banking is one of the most security-sensitive sectors there is. In March, it was announced that UK bank fraud had risen ...
A new London based system will allow consumers to verify directly with the brand if a product is real or fake before they buy, using their smartphone. The system, called Authicode, can even be set to share details like where and when ...
Tags: Smartphone Apps, Counterfeits, UK
Chinese ceramic ware shows a continuous development since the pre-dynastic periods, and is one of the most significant forms of Chinese art. China is richly endowed with the raw materials needed for making ceramics. Chinese ...
Tags: Ceramics, Chinese Ceramics
VMware today announced that its dual persona mobile device software is now available on some Android OS-based mobile devices sold by Verizon. Dual persona technology creates two OS instances, one for business use and the other for ...
Tags: VMware, Verizon Smart Phones
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure. The ...
Tags: Android, Computer Products
Google has introduced an integrated developer environment (IDE) aimed at easing development of Android apps. Android Studio made its debut Wednesday at the Google I/O conference in San Francisco. Android developers could use the Android ...
Tags: Google IDE, Android App
A new cloud version of SAP's Afaria mobile device management software offers IT departments a more convenient way of controlling mobile devices. As with its other cloud-based offerings, SAP hopes to attract enterprises to the cloud-based ...
Tags: SAP, Mobile Device, Amazon
Fiberlink® today announced that its MaaS360 platform supports the ability to monitor a mobile IT environment and perform actions directly through Google Glass. MaaS360 through Google Glass now delivers unprecedented ways to interact ...
Intel is introducing new ideas to secure the public cloud, offering a service in which online files can be accessed after users are verified by an authentication scheme including face and voice recognition. McAfee, a unit of Intel, is ...
Tags: Intel, McAfee, Cloud Storage
Pfizer has launched its counterfeit medicine Viagra (sildenafil citrate) tablets home delivery, a new prescription-fulfillment website for Viagra. Powered by CVS/pharmacy and accessible through Viagra.com, the site offers men with ...
Tags: Pfizer, Viagra Tablets
Los Alamos National Labs, the famous US government laboratory founded in 1943 to develop the atomic bomb, has been operating a "quantum internet" for two-and-a-half years, the organisation has revealed. A quantum internet system ...