Iran's growing cyber capabilities are a "force to be reckoned with", a senior United States Air Force officer has warned. General William Shelton, commander of the US Air Force Space Command, made the comment to reporters at a Defense ...
Xinhua reported that China's Hanlong Group intends to take over Australian mining company Sundance early next year and gain control over a key supply of iron ore in Africa. The Xinhua news agency quoted officials at the privately owned ...
Tags: China, Hanlong Group, Sundance, iron ore, Africa
IDG News Service - The U.S. is facing a dramatically increasing threat from cyber attacks and a future attack on the country's critical infrastructure could have an effect similar to the Sept. 11 terrorist attacks of 2001, the U.S. ...
Tags: cyber attacks, critical infrastructure, Internet, cyber security, US
IDG News Service - Cisco Systems has warned customers about critical vulnerabilities in the Sophos antivirus engine included in its Cisco IronPort email and Web security appliances. "Cisco IronPort Email Security Appliances (ESA) and ...
Tags: Cisco Systems, antivirus engine, Web security appliances
Artsyl Technologies, a leading provider of data capture and document processing automation technologies has formed a strategic partnership with docSTAR, a leading developer of innovative document management and content productivity software ...
Google has joined US government concerns that the International Telecommunication Union (ITU) could get control of the internet through its coming revision of telecoms rules. The UN agency is updating its International Telecommunication ...
Tags: UN, Google, Internet, Computer Products
The US hedge fund Strategic Value Partners(SVP)has submitted a take-over bid for the film producer Kl ckner Pentaplast(KP),the Financial Times has reported.Bank representatives feel that it is likely that the present owner,Blackstone,and ...
Tags: SVP, Stake in Kl Ckner Pentaplast, Kl ckner pentaplast
China and the U.S. were the two largest sources of Internet-attack traffic in the first quarter of 2012, increasing to account for 16% and 11% respectively, according to Akamai Technologies. Attack traffic from China increased three ...
Tags: China, U.S., internet attacks, the first quarter of 2012
Microsoft has won a battle to permanently disrupt a haven for the Nitol botnet that it discovered within an Internet domain controlled by a Chinese ISP. The company has signed a private settlement that Peng Yong and Changzhou Bei Te Kang ...
Tags: botnet, Microsoft, nitol, settlement, Internet domain
New research to investigate best and worst practices in use of spreadsheets in business SAN RAMON,CA,September 17,2012/24-7PressRelease/--Ventana Research will commence a new benchmark research to educate organizations on the use of ...
Tags: Ventana Research, Spreadsheets, Benchmark
The future of internet governance is to be decided this week as rival groups hammer out a new international telecoms treaty. Regulators from 193 countries are negotiating new International Telecommunications Regulations(ITRs)at the World ...
Tags: of internet governance, WCIT, international telecoms treaty, ITRs
A suspected hacking attack has hit a UN agency meeting in Dubai at which delegates are discussing new telecommunications controls that could alter the way the internet is governed. Among other groups,European MPs have voiced concerns that ...
Tags: Hackers, internet governance, ITU, WCIT organisers
French poultry firm Doux,which entered into administration in June 2012 putting the livelihood of over 3,400 workers and 800 farmers at risk,has received 11 takeover bids. Bidders included co-operative Terrena,agribusiness firm La ...
Microsoft and Google are in discussions with the UK government and regulatory officials about unused sections of airwaves known as white space. These discussions have led to speculation that the two companies are looking to set up a free ...
Microsoft's new operating system, Windows 8, has been welcomed by a security expert, who cites a raft of tweaks and new features as beneficial for the protection of computers running the software. The most significant change, according to ...