IGEL Technology, a leading worldwide thin client manufacturer, announced today its partnership with international IT and data security specialist, CenterTools. The partnership strengthens IGEL's commitment to providing the highest level of ...
Tags: IGEL Technology, thin client manufacturer, IT, data security
A top Apple security guru Thursday presented an in-depth view into the security architecture for iOS, the basis of iPhones and iPad tablets, underscoring the complex certificate-based encryption framework Apple has adopted. Our attitude ...
Tags: Apple, security guru, iOS, iPhones, iPad tablets, crypto architecture
2X Software, a global leader in desktop virtualization and application delivery, today announced full compatibility with IGEL Linux thin clients. The company's 2X ApplicationServer XG is now available on IGEL Linux thin clients with the ...
Tags: 2X Software, desktop virtualization, application delivery
Over half of Android devices are vulnerable to known security flaws that can be exploited by malicious applications to gain complete access to the operating system and the data stored on it, according to a report from mobile security firm ...
Tags: Android, applications, critical, devices, vulnerabilities
Details have emerged of an extraordinary attack in which millions of DSL broadband routers in Brazil were hit by a serious software flaw that allowed criminals to gain complete control of all web traffic running through them. First ...
Tags: Broadcom chipset, cyber attacks, DNS, malware, broadband routers
Cactus Technologies Limited has now begun offering custom feature sets for OEMs needing something more than an off the shelf flash storage device. Joseph Chang, VP of Engineering remarked, "Many customers applications need special ...
Tags: Cactus Technologies Limited, OEM, shelf flash storage, flash card
About 200 Android applications currently hosted on Google Play create spoofed SMS messages on the devices they are installed on, according to security researchers from antivirus vendor Symantec. This technique can theoretically be used ...
Late next year, consumers will be able to buy smartphones that either come with native hypervisor software or use an app allowing them to run two interfaces on the phone: one for personal use, one for work. The technology could help ...
Tags: AMD, Business devices, BYOD, consumer, Dual hypervisor, enterprise
Security threats to your mobile device such as malware, fraudulent lures such as SMS spoofing, and toll fraud, are all becoming favourites of digital crooks as people move away from using PCs and toward smartphones and tablets, according to ...
Tags: cybercrime, mobile devices, mobile security, PC, tablet
Cisco Systems has taken a step back from its Cisco Connect Cloud service, removing it as the default setting for management of its Linksys EA Series Wi-Fi routers after a firestorm of complaints from customers about automatic firmware ...
Over half of Android devices are vulnerable to known security flaws that can be exploited by malicious applications to gain complete access to the operating system and the data stored on it, according to a report from mobile security firm ...
Tags: Android device, security flaws, malicious applications
This year's Intel Developer Forum was upstaged by Apple's iPhone 5 launch event, which to some show attendees felt like a reprise of last year, when IDF had to compete with Microsoft's Build conference. Apple's event dominated the second ...
Tags: Intel, PC, Mobile Devices, Forum Signals Market
Apple yesterday sent out press invitations to a media event on Wednesday, Sept. 12, in San Francisco, with a clear hint that iPhone 5 will be announced then. The tagline on the document is short and suggestive: "It's almost here." ...
Tags: Apple, highlightedpost, iPhone, iphone 5 launch, San Francisco
A variation of the attack that can wipe data from Samsung Android devices when visiting a malicious Web page can also be used to disable the SIM cards from many Android phones, researchers have said. Ravishankar Borgaonkar, a research ...
Tags: Android, Galaxy Ace, highlightedpost, Samsung, SIM
After a number of delays, the beta of the Fedora 18 Linux-based distribution has been released. The beta release date had been extended six times over the past two months, mostly due to an underestimation of the amount of work required to ...
Tags: anaconda, beta, Distribution, fedora 18, highlightedpost, Linux, software