Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole
The website of a U.S. organisation specialising in national and international security policy was compromised with malware that targeted a previously unknown vulnerability in Internet Explorer. A nation-state looking to compromise the ...
Tags: Nation-state, attack, IE, flaw
The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in Microsoft's Silverlight browser plug-in to the tool's arsenal. Exploit kits are essentially malicious Web applications ...
Tags: Computer Products, software
OLEDs are already used in the displays of smart phones or digital cameras today. They offer an especially bright image with high contrast, but come with a serious drawback: typically, only one quarter of the electrical energy invested in ...
Spear phishing is one of the most effective ways to break into a corporate network – and recent studies show that employees can be easily tricked on social media to provide the information needed to launch attacks. A phishing attack ...
Tags: Computer Products, software
Kaspersky Lab has revealed research results that show an increase in malware in the Middle East. The data, provided by Kaspersky Security Network, reveals that The UAE had the highest rate of attacks in the region, suffering 34% of all ...
Tags: Computer Products, Kaspersky, software
Covalon Technologies has granted exclusive rights to Molnlycke Heath Care to exploit Covalon's antimicrobial silicone adhesive technology in the field of single-use surgical, wound care and vascular access medical dressings. Pursuant to ...
Tags: Covalon, Silicone Adhesive
A study by analyst IDC shows how companies are using the open source Hadoop big data analytics systems alongside other systems to get value out of their data. IDC’s “Trends in Enterprise Hadoop Deployments” report, ...
Tags: Hadoop, Big Data Analytics
Anvil Semiconductors Ltd of Coventry, UK has secured £1m in funding to help it speed the development and commercialization of its silicon carbide (SiC)-on-silicon technology for power devices. The benefit of SiC-based devices is ...
Tags: SiC power converters SiC-on-silicon driver ICs, Electrical, Electronics
Privalia, a Spanish online apparel firm, has signed a partnership agreement for creation of a chair at the ISEM Fashion Business School-University of Navarra, the first business school specializing in apparel and fashion companies that ...
Tags: Online Apparel, Privalia
Mongolia on Friday unveiled a raft of new investment agreements with China--including an oil-exploration deal—that Mongolian Prime Minister Norovyn Altankhuyag said in an interview would build up the landlocked country's ...
Tags: oil-exploration, crude-oil
The international “Science Award Electrochemistry” from BASF and Volkswagen goes in 2013 to Dr. Karl Mayrhofer, work group “Electrocatalysis”, Max-Planck-Institut für Eisenforschung, Düsseldorf. The jury of ...
Tags: BASF, Volkswagen
New data protection laws intended to protect citizens' privacy, which could see internet companies forced to pay out up to €100m (£85m) in fines if they fail to comply, have been given the go ahead by Members of the European ...
Tags: Protection Laws, MEPs
Security expert and reformed hacker Kevin Mitnick has branded anti-virus software useless, claiming: "The only thing McAfee is good at is making videos." Further reading Not enough cyber warriors to fight computer hackers, says former ...
Tags: Computer Products, software, hacker
As anticipated, the latest round of Microsoft’s Patch Tuesday monthly release of security fixes addresses a widely known Internet Explorer (IE) vulnerability already being exploited by malicious hackers. Overall, for October’s ...