They say no one can hear you scream in space, but if you so much as whisper on the Web, you can be tracked by a dozen different organizations and recorded for posterity. Simply visiting a website can allow its operators to figure out your ...
Tags: device information, advertising cookies, web
Samsung has filed for a re-trial in its patent dispute with Apple,claiming misconduct by members of the jury in the original trial. Apple had won a sweeping victory in the earlier trial in August,during which the jury took less than three ...
Tags: patent dispute, Samsung, Apple, jury
A suspected fault in how Samsung Electronics has implemented the Android's kernel in several of its devices could allow a malicious application to gain total control over the device. The vulnerability was described on Saturday by the user ...
Tags: Samsung, Computer Products, Android
Proactive Investors reported that Sirius Resources NL has provided an update to the market on the drilling and other activities at its Nova nickel copper deposit in Western Australia. Nickel copper sulphides confirmed at upper edge of ...
Tags: Sirius Resources, nickel, copper, Nickel copper sulphides
Skyworks Solutions Inc of Woburn, MA, USA, which manufactures analog and mixed-signal semiconductors, has launched a highly efficient, broadband, 13dB gain, gallium arsenide (GaAs) heterojunction bipolar transistor (HBT) drive amplifier in ...
Blackham Resources Limited has secured further funding for its 100% owned Matilda Gold Project which currently yields 1.4 million ounces of gold resources in a major Western Australia goldfield. It has agreed to issue 2,500,000 ordinary ...
The Windows version of Crisis, a piece of malware discovered in July, is capable of infecting VMware virtual machine images, Windows Mobile devices and removable USB drives, according to researchers from antivirus vendor Symantec. Crisis ...
Tags: Windows version, crisis malware, VMware virtual machine, mobile devices
PRIVATE WiFi, an innovative company in the security software market, now offers site seals so that websites can let their users know that they are concerned with data privacy and online security. PRIVATE WiFi's site seals add a badge of ...
Tags: PRIVATE WiFi, security software market, data privacy, online security
Details have emerged of an extraordinary attack in which millions of DSL broadband routers in Brazil were hit by a serious software flaw that allowed criminals to gain complete control of all web traffic running through them. First ...
Tags: Broadcom chipset, cyber attacks, DNS, malware, broadband routers
During the SteelOrbis fall 2012 conference&67th IREPAS meeting held in Munich on September 30-October 2,Peter Marcus from World Steel Dynamics(WSD)has assessed the current situation in the world steel industry and provided an outlook for ...
Tags: SteelOrbis, 67th IREPAS meeting, Munich, WSD
The file-sharing utility Dropbox is now offering two-factor authentication, a system that makes it much harder for hackers to capture valid credentials for a person's account. Dropbox, one of the most widely used web-based storage ...
Tags: Dropbox, Security, Authentication
Campaigners have slammed the government’s draft proposals to for its Communications Data Bill, which will make it easier for security and police services to spy on e-mails, phone calls and internet activity. The bill will now be ...
A security researcher published on Friday another attack on Facebook’s Instagram photo-sharing service that could allow a hacker to seize control of a victim’s account. The attack was developed by Carlos Reventlov around a ...
Tags: Apple, cyber attack, Facebook, Instagram, iPhone, social network
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting funds while avoiding immediate detection. Tom Eston and Brett Kimmel of vendor SecureState ...
Tags: highlightedpost, Microsoft, Microsoft ERP, Security researchers
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting funds while avoiding immediate detection. Tom Eston and Brett Kimmel of vendor SecureState ...