Now we, all the time in the use of wireless devices, mobile phones, laptops and so on wireless network equipment, the router has become a part of our daily life can not be missing. But you may not understand, even if not the wireless signal ...
Tags: wireless devices, wireless network equipment, wireless signal
At the beginning of December, the first mobile phone as the 360 head of the media, Li Kaixin is a bit nervous, during the pause times. He who was born Zhu Fanghao research. But in the mobile phone business in 360 before Zhu Fanghao is now ...
Tags: 360 mobile phone, Li Kaixin
"Like the same when we predicted on the basis of one-sided viewpoint, the direction of the Internet to see their own good hand." December 10, 2016 - 11 day, sponsored by the "Chinese entrepreneurs" magazine, the FAW - Volkswagen Audi as ...
Tags: a keynote speech, the Internet, a big data
Chinese IT companies are acting to defend their country against cyber attack risks, which are increasingly a threat to national security. China Electronics Technology Group Corporation (CETC) signed a memorandum with Microsoft on Thursday ...
Tags: IT companies, cyber attack, cybersecurity
The 19th China-U.S. Legal Exchange Seminar, jointly sponsored by the Chinese Ministry of Commerce, the Legislative Affair Office of the State Council and the U.S.Department of Commerce, was held in Beijing and Wuhan on January 13-15, 2015, ...
Tags: China-U.S.Legal Exchange Seminar, atmospheric pollution control
The OPEN Alliance (One-Pair EtherNet) Special Interest Group (SIG) has released its automotive Ethernet specifications and tools to promote wider adoption of automotive Ethernet. The open access of specifications is part of the alliance's ...
3-series Fixed Dome Network Cameras deliver superior performance in low-light conditions. Panasonic Australia has announced its 3-series family of network security cameras featuring seven Fixed Dome models. Engineered for high ...
Tags: Security Cameras, Security, Protection
A 31-count indictment filed in the US District Court Monday charged Chinese hackers with gaining illegal access to a handful of Pittsburgh-area industrial firms, including US Steel. The charges against five officers in the Chinese military ...
Tags: Steel, US District Court
From the release of connected bracelets, watches and even a smart toothbrush to a future of one-second high-definition movie downloads, the mobile world is developing rapidly. Here are five major trends to emerge at the four-day World ...
Tags: Mobile World, Consumer Electronics, Electronics, smartphone
FireEye has announced the release of FireEye OS 7.1, the update to the FireEye OS. FireEye says OS 7.1 offers more scalable management capabilities to its CM series, IPv6 network security support to the NX series, and enhanced email ...
Tags: computer
With Gartner predicting the rise of sales of security software, one of the top security software houses, Symantec, appears to be struggling in the market it should be dominating. The firm’s latest quarterly results for the third ...
Tags: security software, Security Market
Israeli researchers at Ben-Gurion University of the Negev (BGU) said a security flaw was discovered by a team member, a PhD student, and that this vulnerability could enable interception of data on Samsung mobile devices based on the Knox ...
Trustwave's SpiderLabs researchers have found a piece of malware that collects data entered into Web-based forms, pretending to be a module for Microsoft's Internet Information Services (IIS) web-hosting software. The malware, which is ...
Tags: malware, IIS, Trustwave, Network security, Microsoft
Eighty per cent of employees are potentially putting their companies at risk through use of unauthorised Software-as-a-Service (SaaS) applications on corporate networks. The extent of so-called "shadow IT" is revealed in a study for ...
Microsoft is planning end-to-end encryption of its internet traffic following concerns that the company had its network security breached as part of the National Security Agency's (NSA) internet surveillance programme. The revelation, ...
Tags: Microsoft, ramp up, encryption, combat, NSA, surveillance