A baby monitor transmits sound, and sometimes video images, from one room to another, so you can keep tabs on your little one from any part of the house. Monitors have two parts – a transmitter and a receiver – and are ...
Tags: Baby Monitor, Sound-activated light, Multiple receivers
The third-party tools and software ecosystem is expanding for Atmel's ARM Cortex-A5-based SAMA5D3 microcontrollers. A5 is ARM's baby A-series-compatible core, designed as an up-grade from the ARM926 and ARM1176 with better mW/MHz than ...
Tags: software ecosystem, ARM, microcontroller
A cyber espionage operation dubbed MiniDuke has targeted government organisations in as many as 23 countries, security vendors said on Wednesday. The malware uses well-crafted PDF documents to trick recipients into opening the malicious ...
Tags: MiniDuke, Malware, Governments
Silent Circle, a startup company that provides encrypted mobile communication services, released a new version of its Silent Text app for iOS that allows users to exchange encrypted files at the push of a button. The files can be set to ...
Tags: Silent Circle, mobile communication service, mobile app
Citrix today announced XenMobile, the rebranded and integrated mobile device management (MDM) software the company acquired through its acquisition of Zenprise last year. "What we've been doing ... is integrating Zenprise pieces with the ...
Tags: Citrix, Apple iOS, Android devices
Citrix on Wednesdy announced XenMobile, a rebranded and integrated mobile device management (MDM) software, which the company acquired through its acquisition of Zenprise last year. “What we’ve been doing is integrating ...
Tags: Citrix, MDM Tool, Android, iOS Devices
WISeID Social app and its website WISeID.com have provided encryption services for Facebook walls since 2010. Now WISeID Social can also encrypt Google+ wall postings, SMS and tweets, allowing privacy over any communication service, even ...
Tags: WISeID Social app, encryption service, Facebook walls, social networks
When a relatively small high-tech company with some big aerospace and defense customers wanted to adopt cloud-based email for its employees, it faced the challenge that whatever choice of cloud service it adopted, it had to meet the ...
The second draft of the controversial Communications Data Bill, which aims to allow unparalleled interception of data about UK citizens' online communications and voice calls, is to be released next month. Government publishes draft ...
A Los Alamos National Laboratory quantum cryptography (QC) team says it successfully completed the first-ever demonstration of securing control data for electric grids using quantum cryptography. Quantum cryptography provides a means of ...
Tags: quantum cryptography, securing control data, electric grids
"HomePlug AV is used in set-top boxes in Europe and is starting in the US," Greenvity CEO Hung Nguyen. "Any lighting system needs to be interoperable with set-top boxes. HomePlug Green PHY co-exists and inter-operates with HomePlug AV." ...
Tags: HomePlug AV, set-top boxes, US
A French website collecting links to content stored on the Mega file-sharing service is experiencing trouble in what may be an effort by Kim Dotcom's latest enterprise to avoid concerns over illegal file sharing. The website, ...
Tags: website, Mega, file-sharing service
Kaspersky Lab on Wednesday made its bid to reduce the complexity associated with managing IT security processes in corporate environments, with a new product that combines the company's anti-malware technology with new mobile and system ...
Tags: Kaspersky Lab, IT security processes, corporate environment
Kaspersky Lab on Wednesday made its bid to reduce the complexity associated with managing IT security processes in corporate environments, with a new product that combines the company’s anti-malware technology with new mobile and ...
Tags: Kaspersky Lab, IT security processes, new mobile, anti-malware technology
Representatives of newly launched file-storage and sharing service Mega addressed some of the concerns raised by security researchers in recent days about the site's architecture and the implementation of its cryptographic features. In a ...
Tags: file-storage, sharing service, Mega