IDG News Service-A group of hackers leaked email contact information of experts working with the International Atomic Energy Agency(IAEA)after breaking into one of the agency's servers. The group published a list of 167 email addresses ...
Tags: computer systems, computer data, computer, information security
FENG shui, the 6,000-year-old Chinese art or practice of geomancy, is said to utilize the laws of heaven and earth to improve by increasing positive energy or qi and avoiding the negative energy. In practice, feng shui (literally ...
Researchers from the University of Almeria, Spain, have developed a new method which helps in finding the presence of most minute residues of drugs, which are actually given to livestock, in some infant foods. The researchers detected ...
Tags: Scientists, New Method, Veterinary Drugs, Infant Foods
In its November 2012 Blue Coat Mobility Study,the company surveyed 350 respondents and found that most organizations allow employees access to company email(83 percent)and instant messaging(56 percent)on personal devices,but only a fraction ...
Tags: IT, Blue Coat Mobility Study, BYOD, mobile malware
Renewed calls for the government to give the supermarket watchdog sharp teeth came today(November 19)from anti-poverty agency ActionAid,as the Groceries Code Adjudicator Bill enters its second reading in the House of Commons. It urged the ...
Google this week announced it had shipped a stronger Flash Player sandbox for the OS X version of Chrome,making good on an August promise to ship a Mac browser better able to ward off exploits of the Adobe software. Chrome 23,which ...
Tags: Google, Flash Player sandbox, OS X version of Chrome, PPAPI
Growth in own-label food has helped Sainsbury achieve a 2.5%rise in profits to £405M in the six months to September 29. Underlying profit before tax climbed by 5.4%to reach £373M. The retailer's ceo Justin King told BBC ...
Tags: profits, retailer, grocery market
The U.S.and China are likely to resolve the conflict over potential security threats from Huawei Technologies'network equipment without a trade war,Cisco Systems chairman and CEO John Chambers said on Tuesday. A U.S.Congressional report ...
Nearly a quarter of worldwide internet users are still running outdated browsers, creating huge gaps in online security, a study has revealed. Out of a random sample of 10 million customers, security firm Kaspersky found 23% were using ...
Tags: browsers, outdated browsers, online security, Kaspersky, security threats
Lighting LEDs are a route to energy efficiency that also allow creative effects that were not possible with incandescent bulbs and fluorescent tubes. But the output spectrum, like that of fluorescent tubes, is nothing like the sunlight ...
Tags: LED lighting, LED, Lighting LEDs, energy efficiency, energy
The number of consumer smartphone and tablets brought into workplaces will more than double by 2014, according to a recent study, but security on the endpoints is lacking. Juniper Research claims the number of devices being used in the ...
Tags: BYOD devices, smartphone, tablets, mobile devices
This November marks the ninth year for which we will be announcing the Gibbs Golden Turkey Awards... To refresh your memories,these awards recognize those individuals,companies or entities that don't,won't or can't come to grips with ...
Tags: The Gibbs Golden Turkey Awards, GGTA, Yahoo, security, ESET
IDG News Service-Just as mobile operators start to get their networks back up in most areas affected by Hurricane Sandy last week,another storm is heading for the region that was hardest hit. Carriers are preparing to keep their regular ...
Tags: mobile operators, Hurricane Sandy, networks, Storm
Mozilla introduced a pre-loaded list of domains for Firefox that only can be connected to securely in order to help protect the privacy and security of users. To force secure connections between the browser and a server,Mozilla uses ...
Tags: Firefox, Secure Connections, privacy and security, HSTS, browser
While the risk of being hacked,conned or having sensitive information stolen is possible all through the year,most security experts agree that the holiday season brings a spike in fraudulent activity,both online and off. CSO compiled a ...
Tags: Christmas, Fraudulent auction, payment sites