DocVerify has today released their new WebHook feature that allows users to instantly update the status of their electronic signatures on documents to any remote website. This innovative, powerful feature operates by doing a simple GET or a ...
Tags: DocVerify, WebHook, electronic signature, remote website
Outlook.com, the new webmail service that Microsoft is previewing and that will replace Hotmail, has gained security boosts against phishing and spam. The new safety features come via support for the DMARC email authentication standard ...
SceneChat , a social video advertising startup addressing the needs of brand marketers, researchers and educators, with an innovative interactive video and social sharing solution, today announced the immediate availability of a free trial ...
Tags: SceneChat, social video advertising, interactive video
Google will begin to phase out its Sync service for consumers and discontinue several other services in early January. The shuttering of the services, described as "winter cleaning" by the company, was announced in a post on its official ...
Tags: Google, Computer Products, Sync, Google Sync
A novel technique based on MapReduce could let hackers hijack computing resources used by cloud-based mobile browsers and use them anonymously, according to security researchers from North Carolina State University and the University of ...
Tags: cloud computing, Mobile browser hack, mobile device threat, smartphone
Attackers can abuse the way browsers and other applications handle steam:// protocol URLs in order to exploit serious vulnerabilities in the Steam client or games installed through the platform, according to researchers from startup ...
Tags: attackers, browsers, applications, URL, vulnerabilities
The world of fashion is becoming more and more unpredictable with each passing day. It is becoming increasingly difficult for an apparel or fashion ... Full news available to our Market Watch ...
With the advent of mobility and the influx of BYOD in enterprise, employers are struggling to keep control of their networks, according to John Yun, Director, Product Marketing, Blue Coat. Yun, who is in Dubai promoting Blue Coat’s ...
Tags: Blue Coat botnets, BYOD, cyber attacks, hackers
Two years after it managed to place a browser-related app on the iOS App Store, Mozilla last week announced it was retiring Firefox Home and yanked it from Apple's market. The move was only the latest in a string of messages that the ...
Tags: iOS App Store, Mozilla, Firefox Home, Apple's market
Headquartered in Atlanta, AirWatch has been in the MDM business since 2003 with one goal in mind-helping companies focus on using mobile technology rather than the complexities of managing it. When your business is ready to take mobile ...
Tags: AirWatchm, MDM business, mobile technology
Microsoft has uncovered a vulnerability in the PC supply chain that allows hackers to pre-install malware-infected copies of Windows onto new machines. As a result, the company has received approval from a federal court to strangle a ...
Tags: Microsoft, PC, surgical sinkhole
Search Engine Optimization firm, Brick Marketing, announces full-day SEO Training Classes in Dallas, Texas. Search Engine Optimization firm, Brick Marketing announces full-day SEO Training Classes in Dallas, Texas. The Dallas SEO Training ...
Tags: Search Engine Optimization, Brick Marketing, SEO Training, SEO
As many as 300,000 PCs and Macs will drop off the Internet in about 65 hours unless their owners heed last-minute calls to scrub their machines of malware. According to a group of security experts formed to combat DNSChanger, between a ...
Tags: Internet, PCs and Macs, infected computers
The Open Mobile Alliance (OMA) has developed a standard for handling 2D barcodes that it hopes will direct mobile phone users to websites more easily. By standardizing the specification for encoding, decoding and resolution of 2D barcodes, ...
Attackers can abuse Facebook’s phone search feature to find valid phone numbers and the name of their owners, according to security researchers. The attack is possible because Facebook doesn’t limit the number of phone number ...
Tags: Facebook, highlightedpost, Mark Zuckerberg, Phone number search, privacy