Imagine driving while using your iPad to play music, and look at Google maps. Now imagine your iPad is built into the car and also runs your climate control, phone, and even basic car controls, such as braking, steering, suspension, and ...
Tags: luxury cars, cars
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why. Last week, security companies Eset and Sucuri found Apache servers infected with Linux/Cdorked. If that ...
Tags: Web software, software, Computer Products
Google has pushed out an update to Glass, its upcoming glasseslike wearable computer. A few thousand developers are working with an early version of Glass. When they fire up the devices today, they'll find about a dozen tweaks and ...
Tags: Google, Software Update
Updates to camera or camcorder firmware—the on-board software that runs an electronic device—take place just as frequently as smart-phone firmware updates, particularly for advanced cameras like the Nikon D5200. But the process ...
LAST night's midnight premiere of Star Trek into Darkness confirms the cult of the USS Enterprise thrives 47 years after the first TV episodes aired. Captain James T. Kirk, Spock and the crew have indeed managed to "live long and prosper" - ...
Tags: Google, Computer Products
It is plain and simple: the days of anonymous internet posting are over. The internet is no longer a safe-haven for people looking to harass competitors or individuals. Libelous accusations can be tracked down, and proper legal action can ...
SearchYourCloud, which provides a single search interface to find documents stored on a desktop or several cloud-based services, expanded on Tuesday to include Box. Access to Box is being included in a new version of the SearchYourCloud ...
Tags: Cloud, Software, Computer Products
A subdomain of a U.S. Department of Labor website appeared offline on Wednesday after an apparent hack that looks similar to a known China-based hacking campaign nicknamed DeepPanda. The tampered page, called Site Exposure Matrices (SEM), ...
Tags: Labor Website, Computer Products
A cybercriminal has taken to selling his malware and related services on Facebook, boldly choosing a public forum to reach potential customers over the secretive world of the online underground. RSA researchers?recently discovered?on the ...
Tags: Facebook, Computer Products
Training with power remains one of the most elite market niches in cycling: so expensive that even some ProTour teams limit their riders' access to power meters, keeping them under lock and key and lending them out for limited tests. In the ...
Tags: Transportation, bike, software, hardware
Researchers from security firm Trusteer have found a new variant of the Gozi banking Trojan program that infects a computer's Master Boot Record (MBR) in order to achieve persistence. The Master Boot Record (MBR) is a boot sector that ...
Tags: Computer Products, software
Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online. ...
Tags: Researchers, Trading Software
The CEO of archiving service Evernote this week said his company will soon release branded hardware with partners, as it moves toward creating its own devices. "We won't actually do the manufacturing, but we'll do the co-design together," ...
Tags: Computer Products, Hardware
Microsoft amended a security update containing a patch that reportedly caused errors in some third-party software. The update, number 2823324, was distributed on Tuesday as part of MS13-036, a batch of patches that fix three Windows ...
Tags: Microsoft, Computer Products
Dialight has introduced integrated controls for its industry leading LED lighting fixture portfolio. The patent-pending, smart grid compatible control package is available in variety of communications protocols. These include powerline ...
Tags: UK Dialight LED Fixtures, LED, Lights, Lighting