Extra Virgin Foods, a manufacturer and imported of Greek foods, has launched a new Greek Yogurt product in the US, branded as Olympiana Tsantila Imported Greek Yogurt. The first and only Greek yogurt ever sold in America was launched at ...
Tags: Extra Virgin Foods, Yogurt
As a victim of cybercrime in recent years, China chooses not to suffer in silence, but actively fight cybercrime and help govern the cyber community together with the rest of the world. As host of the Second World Internet Conference ...
Tags: Cyberspace, cybercrime, e-business
Inspired by tiny particles that carry cholesterol through the body, MIT chemical engineers have designed nanoparticles that can deliver snippets of genetic material that turn off disease-causing genes. This approach, known as RNA ...
Tags: RNA, MIT, Gene Silencing, Nanoparticle
Apple’s iPod business collapsed last quarter, with revenue plummeting 55% and the number of music players dropping by more than half compared to the same period in 2012, the company said yesterday. The iPod, which debuted nearly 13 ...
After a series of media reports, it is clear that wireless implanted medical devices can be hacked. Although the risk is now more hypothetical than actual, the vulnerabilities warrant attention. Implanted devices often rely on wireless ...
Key traffic across the internet has been "hijacked" several times this year and deliberately routed through locations in, first, Belarus and then Iceland. The hijackings - or "network interceptions" - were targeted at specific cities and ...
Tags: Internet, traffic, hijacked, Belarus, Iceland, Renesys
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole
A majority of U.S. Internet users polled in a recent survey report taking steps to remove or mask their digital footprints online, according to a report from the Pew Research Center’s Internet Project and Carnegie Mellon University. ...
Tags: Avoid Surveillance, Internet Users
Prison sentences for hacking and cyber crime are set to rise across Europe if a new draft directive becomes law, as the EU looks to combat cyber espionage and cyber attacks against critical national infrastructure. A draft directive set ...
Tags: Computer Products, software
The creator of popular open-source database MySQL, Michael "Monty" Widenius, wants to see the now-Oracle-owned product disappear from the earth within the next five years" - displaced by his own alternative, MariaDB. Speaking to Computing ...
Tags: Computer Products, software
Twitter's SMS-based, two-factor authentication feature could be abused to lock users who don't have it enabled out of their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish anti-virus ...
Tags: Computer Products, software
Much-hacked social networking site Twitter has finally introduced two-factor authentication in a bid to cut down on the hijacking of accounts. The move follows a string of hacks of high-profile accounts by groups such as the ...
Tags: Twitter, Authentication, Google, Facebook
Twitter will offer users two-factor authentication when they sign in as "a second check to make sure it's really you". Twitter is stepping up its security measures following a series of high-profile breaches by hackers hitting media ...
Tags: Twitter, Double Sign in
Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks. The Research and Education Networking Information Sharing and Analysis Center ...
A standards organization has created a boot environment for tablets and PCs that could potentially run a 64-bit version of Windows RT. The UEFI (Unified Extensible Firmware Interface) Forum on Wednesday announced that its boot firmware ...
Tags: software, Computer Products