British Reuters reported on January 8, cited from the Wall Street Journal on Tuesday, which reported that Apple is developing a low-cost version of iPhone and is expected to be released in 2013. The report quoted an anonymous source, ...
Tags: Apple, iPhone, smartphone, Made-in-China
Cyber attacks on U.S. banks over the last several months reflect a frightening new era in cyber warfare, according to security expert Darren Hayes, who says that corporations are unprepared to battle such attacks because of a shortage of ...
Tags: cyber attacks, U.S.banks, DDoS Bank
The UK Defence Committee is urging the Government to be more vigorous in its approach to cyber threats. A new report released by the Committee says that the British military is now too dependent on information and communications ...
Tags: military, IT, cyber threats, information, communications technology
Euclid, the leading retail analytics company, announces the launch of Euclid Zero, the first zero-hardware solution for real-world shopper analytics. With a single click, Euclid Zero gives retailers, malls and other venues the ability to ...
Tags: Euclid, retail analytics, Euclid Zero, shopper analytics
IDG News Service-Different hacker groups claim to have breached servers belonging to ImageShack,Symantec,PayPal and other organizations. On Sunday,a hacker group called HTP claimed to have compromised Web servers,MySQL databases,routers ...
Tags: hackers, ImageShack, Symantec, PayPal
Cisco Systems said a privacy policy for the Cisco Connect Cloud service that alarmed some customers was a mistake and has been removed. The cloud service,which among other things allows users of some Wi-Fi home routers to manage their ...
Tags: Cisco, Privacy Policy
The path from birth to death is filled with choices about where to work and what kind of work to do. Sometimes the world is nice enough to allow us some input. These days, developers have a lot more say in their employment, thanks to rising ...
Having trouble sleeping? Gaining a bit of weight? Your smartphone or computer might be to blame. Actually, the problem is more likely about your obsession with your laptop and devices than the devices themselves. A new study from ...
Tags: Consumer Electronics, Smartphones, tablets
SAN FRANCISCO, CA, June 13, 2012 /24-7PressRelease/ -- OPSWAT announced that their free security application removal tool, AppRemover, has been downloaded over one million times. Available at http://appremover.com, the tool enables easy and ...
Tags: AppRemover, security applications, McAfee, Symantec, OPSWAT
The International Telecommunication Union (ITU), the UN body that has played a standards-setting role for global telecommunication networks over the decades, Wednesday night suffered a website attack that severely disrupted a conference to ...
Tags: ITU, global telecommunication, networks, Website Cyberattack
Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration ...
Tags: Security researcher, botnet, Tor network, DDoS
Chip maker Advanced Micro Devices(AMD)plans to cut as many as 2,340 jobs,or about 20%of its workforce. The cuts are expected to be announced as early as next week,according to Bloomberg,citing an anonymous source as the plans are not yet ...
Japanese police are looking for an individual who can code in C#, uses a "Syberian Post Office" to make anonymous posts online, and knows how to surf the web without leaving any digital tracks -- and they're willing to pay. It is the ...
Tags: Japanese police, reward, wanted hacker
A 22-year-old U.K. man was convicted for his involvement in a series of distributed denial-of-service attacks launched by the hacktivist group Anonymous against PayPal, MasterCard, Visa and other companies in 2010. Christopher ...
Tags: attacks, Anonymous, PayPal, MasterCard, Visa
Hacking group Anonymous claims to have released a set of more than 1 million Apple Unique Device Identifiers (UDIDs) obtained from breaching the FBI. The group indicated that the action was part of is AntiSec (Anti Security) campaign to ...
Tags: FBI, Apple, Anti Security, security flaws