Now we, all the time in the use of wireless devices, mobile phones, laptops and so on wireless network equipment, the router has become a part of our daily life can not be missing. But you may not understand, even if not the wireless signal ...
Tags: wireless devices, wireless network equipment, wireless signal
On Christmas Eve, U.S. embassy in China issued security warnings for Westerners in Beijing's Sanlitun area, a popular Beijing diplomatic and entertainment district. Thanks to special forces dispatched by the Chinese government, no incidents ...
Tags: Fighting Terrorism, Anti-terrorism
Posted in Medical Device Business by Brian Buntz on January 30, 2015 Antique medical devices provide a glimpse into how medicine was performed in past centuries. But few people have taken a look at how medical care was administered on ...
Tags: Medical Devices, Health
Sony Pictures has revealed it was largely unprepared for the hacking attack that took place last year. Michael Lynton, the chief executive of the firm, spoke to the Associated Press, describing the firm as being a ‘canary in the ...
Tags: Sony, Consumer Electronic, CES
One of the largest known breaches, resulting in 110 million records lost and hundreds of millions of dollars in damages, started with a small, third-party supplier. We’re talking about Target, where attackers compromised Fazio ...
Tags: Supply Chain, Electrical, Electronics
Oracle has issued a comprehensive list of its software that may or may not be affected by the OpenSSL (secure sockets layer) vulnerability known as Heartbleed, while warning that no fixes are yet available for some likely affected products. ...
Tags: Computer Products, Web Security
If you are basking in the convenience of doing an online bank transfer at a coffee house while spooning the cream off a designer special, consider the tradeoff, which is placing your personal data at risk. Also consider yourself warned by ...
Tags: Consumer Electronics, Wi-Fi
Apple said Monday it was developing a security fix for its Mac OS X computer operating system after a patch released for its iPhones and iPads to thwart hacker attacks. The California tech giant released its security update for the iOS 7 ...
An Adobe Flash exploit has targeted three sites. Adobe Systems on Thursday announced knowledge of the exploit and what steps to take. The company assigned the CVE identifier CVE-2014-0502 to the vulnerability. Its security bulletin ...
Tags: zero-day exploit, Security updates, Adobe Flash Player
The U.S. government, finally realizing that it has to take action to ensure a minimum level of cybersecurity in networks that manage the nation's energy, water and financial services, presented the Framework for Improving Critical ...
Tags: Consumer Electronics
The attack on Yahoo that started with the theft of user credentials from a third-party database highlights the risk of sharing usernames and passwords across multiple websites. Yahoo reported Thursday that attackers using computer ...
Tags: Yahoo, Identity Management
Pessimists are fond of saying that no good deed goes unpunished. An Australian teenager who reported a security vulnerability in a government website and now faces legal troubles probably agrees. Joshua Rogers, a 16-year-old Victoria ...
Tags: Consumer Electronics, Electronics
Target shoppers. Just in time for the holidays, your credit card data has been compromised. And according to Brian Krebs, the purloined information has been "flooding underground black markets in recent weeks, selling in batches of one ...
Tags: Consumer Electronics, Electronics, Debit Cards, Credit
Arbor Networks' 2013 research of DDoS activity in the Middle East has revealed that the average size of attacks in the region is 2.376Gbps and the average duration of an attack exceeds an hour and ten minutes. Mahmoud Samy, Area Head, ...
Tags: middle east, Arbor, network, attack
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data. Researchers from security firm Arbor Networks found two servers that were used ...
Tags: Computer Products, software