Silent Circle, a startup company that provides encrypted mobile communication services, released a new version of its Silent Text app for iOS that allows users to exchange encrypted files at the push of a button. The files can be set to ...
Tags: Silent Circle, mobile communication service, mobile app
Attackers are using fake versions of a recently released report about a Chinese cyberespionage group as bait in new spear-phishing attacks that target Japanese and Chinese users. The report was released Tuesday by security firm Mandiant ...
Tags: cyberespionage, China, cyber security
LayTec AG of Berlin, Germany (which makes in-situ metrology systems for thin-film processes, focusing on compound semiconductor and photovoltaic applications) says that its Application and Support Department (A&S) is now headed by new chief ...
Tags: LayTec service, LayTec, CTO
Devices used by many radio and TV stations to broadcast emergency messages as part of the U.S. Emergency Alert System (EAS) contain critical vulnerabilities that expose them to remote hacker attacks, according to researchers from security ...
Tags: U.S.Emergency Alert System, remote hacker attacks, cyber security
Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer. Most financial Trojan ...
Barracuda Networks released a new update on Monday to further mitigate a security issue that could have allowed attackers to gain unauthorized access to some of its network security appliances through backdoor accounts originally intended ...
Tags: Barracuda Networks, security issue, network security appliances
Creating some consternation in the Web development community, Opera Software is switching from a home-built rendering engine to the more widely used open-source WebKit, now employed in the Apple Safari and Google Chrome browsers. "It ...
Tags: Opera Software, Apple Safari, Google Chrome
A watch that doubles as a computer and two-way radio has been a technology vision since at least the 1950s. Recently, reports that Apple is building an iWatch have lit a fire under the smart watch concept, at least in part because of ...
Tags: Apple, smart watch, company news
Google is rolling out a new version of AdWords that will allow advertisers to manage and bid for ads across computers, smartphones and other devices within the same campaign, in a bid to simplify mobile advertising. The company said ...
Tags: Google, AdWords, mobile advertising
Children as young as 11 years old are developing malicious code to steal personal information from online gamers, according to antivirus software provider AVG. The Q4 2012 Community Powered Threat Report reveals some schoolchildren have ...
Tags: AVG, malicious code, cyber security
Qualitas Health and Valicor Renewables have entered into a strategic partnership to combine their expertise and experience in biology, advanced chemistry and technology commercialization to develop next-generation algae-based products. ...
Tags: Qualitas Health, Valicor Renewables, strategic partnership
Soraa Inc of Fremont, CA, USA, which develops solid-state lighting technology built on ‘GaN on GaN’ (gallium nitride on gallium nitride) substrates, has announced the next generation of its high external quantum efficiency ...
Tags: Soraa GaN-on-GaN, LED, USA
Financial malware authors are returning to traditional, phishing-like, credential-stealing techniques in order to evade detection, according to researchers from security firm Trusteer. Most financial Trojan programs used by cybercriminals ...
Tags: Financial malware, credential-stealing techniques, detection
Green Throttle Games, maker of the Atlas wireless game controller, the Arena console app and publisher of mobile games, is gaining momentum in the video game developer community with the availability of its software plug-in on the ...
The passwords of about 250,000 Twitter users were stolen in a "sophisticated" cyber attack similar to those that recently hit major Western news outlets. "This attack was not the work of amateurs, and we do not believe it was an isolated ...
Tags: cyber attack, media companies, network