Reprogramming the identification number of a cellphone could be punishable with a prison sentence of up to five years under the terms of a proposed law announced Friday. The Mobile Device Theft Deterrence Act of 2013 makes changing the ...
Tags: Law, Cellphone IDs, Computer Products
European Union antitrust regulators are collecting information to determine whether Apple's iPhone contract deals with various telecoms operators have been designed to shut out rival smartphone makers, such as Samsung, HTC and Nokia. ...
Tags: Apple, Smartphone, Antitrust Probe
Much-hacked social networking site Twitter has finally introduced two-factor authentication in a bid to cut down on the hijacking of accounts. The move follows a string of hacks of high-profile accounts by groups such as the ...
Tags: Twitter, Authentication, Google, Facebook
Seeing a “404 error” or the Twitter “Fail Whale” can really kill a good online buzz. Those kinds of service outages, though, occur on the Internet on a daily basis, as the latest numbers from Outage Analyzer ...
Tags: 404 error, ad, akamai, Amazon Web Services, analytics, apps, Ben Grubin
Twitter, in a much-needed move to keep its users safer from cyberattacks, is introducing a more secure login process. The system, called Login Verification, gives users the option to have a verification code sent to their mobile phone ...
Tags: Twitter, Sign-in, Computer Products
Finnish diabetes technology company Mendor has entered into partnership with Europe-based diagnostics company A. Menarini Diagnostics for distribution of its blood glucose monitoring system. Under the terms of the agreement, Mendor's ...
Tags: A.Menarini Diagnostics, Blood Glucose Monitoring System
Yoking cognitive computing with customer service, IBM has launched a system that can reference large amounts of unstructured data to help companies better field customer phone calls. The IBM Watson Engagement Advisor uses IBM's Watson, ...
Tags: Computer Products, IBM, Smart Bot
Twitter will offer users two-factor authentication when they sign in as "a second check to make sure it's really you". Twitter is stepping up its security measures following a series of high-profile breaches by hackers hitting media ...
Tags: Twitter, Double Sign in
Andy Kemshall, co-founder and technical director at SecurEnvoy, speaks up about voice recognition as a security tool Banking is one of the most security-sensitive sectors there is. In March, it was announced that UK bank fraud had risen ...
Smartphone users in the UK are showing a huge appetite for sponsored free or reduced mobile phone bills, a new study has found. The study into smartphone users' attitudes towards mobile marketing and use of data was conducted by research ...
Tags: Mobile Bills, Smartphone
Yahoo Japan, the country's largest Web portal, said up to 22 million user IDs may have been leaked during a hack that was discovered last week. The company emphasized that the IDs are already public information, and no passwords or other ...
Tags: Yahoo Japan, User ID, Computer Products
Samsung will host a US$800,000 contest for developers that build apps for the Galaxy S4 using the company's peer-to-peer software interface. The South Korean company said Monday entrants in its "Smart App Challenge 2013" must make use of ...
EE has hit back at claims by the Sunday Times that it and market research firm Ipsos MORI have been working on a deal that would feed data on EE's 27 million customers to the research firm, and even, allegedly, to the police. An EE ...
Tags: Customer Info, Computer Products, EE
Nokia has unveiled its first Lumia smartphone with a metal cover, low-light camera features and new social network apps. But the new model failed to impress investors, who sent the company's stock down more than 5 per cent. The features ...
Tags: Nokia, Windows, Smartphone
D-Link today announced it is now shipping a new line of AC Routers with the availability of the Wireless AC1750 Router (DIR-868L), Wireless AC1200 Router (DIR-860L), Wireless AC1000 Router (DIR-820L) and Wireless AC750 Router (DIR-810L). ...