VeriFone Systems, Inc., announced that Deckers Outdoors Corporation has implemented VeriFone mobile retailing hardware and software to fulfill its omni-channel initiative at 40 UGG Australia brand store locations. The solution enables store ...
Tags: VeriFone Systems, UGG, PCI, iPad mini
The hackers who got into your computer or smartphone are now taking aim at the Internet of Things. The connected toothbrush, sports gear with embedded sensors and smart refrigerators are just a few of the objects showcasing innovations at ...
Tags: Security Risks, IT, Electronics, Internet Security Risk
Pessimists are fond of saying that no good deed goes unpunished. An Australian teenager who reported a security vulnerability in a government website and now faces legal troubles probably agrees. Joshua Rogers, a 16-year-old Victoria ...
Tags: Consumer Electronics, Electronics
Target said Friday that debit card PIN numbers were among the financial information stolen from millions of U.S. customers who shopped at the retailer earlier this month. The company said the stolen personal identification numbers, which ...
Tags: Target, debit card PIN numbers, stolen personal identification numbers
BlackBerry’s new CEO says he is “very interested” in trying to replicate some of the company’s signature security and enterprise productivity on rival platforms. BlackBerry has enjoyed favour in enterprises for its ...
Tags: iOS, Android, Blackberry
Dell Software yesterday introduced a suite of software and services for enterprise mobility management, including a 'secure workspace' for mobile devices that lets enterprise IT managers separate work from data apps. Dell's entry into the ...
Tags: Dell, mobility management, mobile devices, secure workspace
Trustwave's SpiderLabs researchers have found a piece of malware that collects data entered into Web-based forms, pretending to be a module for Microsoft's Internet Information Services (IIS) web-hosting software. The malware, which is ...
Tags: malware, IIS, Trustwave, Network security, Microsoft
As Bitcoin's popularity grows, so does talk about its standing as legal tender, but there are lingering issues that need to be sorted out before people start using Bitcoin to buy everyday things, experts said on Monday. Bitcoin has been ...
Eight top tech companies in the U.S. have asked governments around the world to reform surveillance laws and practices, and asked the U.S. to take the lead. AOL, Apple, Facebook, Google, LinkedIn, Twitter, Yahoo and Microsoft said Monday ...
Buoyed by rising sales generated by its sapphire ingot-making subsidiary USI Optronics, ferrite core maker Acme Electronics is expected to return to profitability in the fourth quarter of 2013, according to market watchers. Acme posted a ...
Researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receive data through inaudible audio signals. Michael Hanspach and Michael Goetz, two researchers from the Fraunhofer ...
Tags: Network Air Gaps, microphones, speakers
Eighty per cent of employees are potentially putting their companies at risk through use of unauthorised Software-as-a-Service (SaaS) applications on corporate networks. The extent of so-called "shadow IT" is revealed in a study for ...
Microsoft is to invest €170m (£141m) to expand its Europe, Middle East and Africa (EMEA) data centre in Dublin, Ireland. The expansion is scheduled to be completed by spring 2014, and will create 380 construction jobs and 20 ...
Microsoft is planning end-to-end encryption of its internet traffic following concerns that the company had its network security breached as part of the National Security Agency's (NSA) internet surveillance programme. The revelation, ...
Tags: Microsoft, ramp up, encryption, combat, NSA, surveillance
A new malicious software programme, advertised for sale on underground forums, claims to mine and steal bitcoins, according to a Danish security company. The Atrax malware is notable for its low US$250 price and use of TOR, short for The ...