Mobile operators are hoping to make it easier for developers to integrate network-based features with their applications using a new platform called OneAPI Exchange. Mobile operators are working on several fronts to become a more integral ...
Tags: OneAPI Exchange, Mobile operators, telecom
A Polish security firm known for rooting out Java vulnerabilities has reported two new bugs in the browser plug-in to Oracle, Security Explorations said today. On its bug-reporting status page, Security Explorations noted that it had ...
Tags: Java vulnerabilitie, Oracle, company news
Teradata, the analytic data solutions company, announced that the Germany-based EHI Retail institute has presented UK retailer Shop Direct Group with the "Best Enterprise Solution" award for retail technology in Europe. The recognition was ...
Tags: Teradata retail, Teradata, retail technology
Ericsson, Mozilla and AT&T will demonstrate a Web Real-Time Communication (WebRTC) proof of concept at Mobile World Congress 2013 this week. The joint demonstration builds on Ericsson’s Web Communication Gateway, the Mozilla Social ...
Critical Pharmaceuticals has completed second clinical trial on CP024 intranasal growth hormone. CP024 growth hormone nasal spray was safe and well tolerated in the study that administered six dose levels of CP024 in healthy subjects. ...
Clinical stage biopharmaceutical company Apogenix's Apocept (APG101) has won FDA orphan drug designation to treat myelodysplastic syndromes (MDS). Apogenix also announced the commencement of Apocept Phase I trial in MDS patients in ...
Tags: FDA, orphan drug, biopharmaceutical
New software capable of dredging social media websites, mining people's social networks and "predicting their behaviour", has been developed by defence contractor Raytheon. The software, called Rapid Information Overlay Technology (RIOT), ...
Tegile Systems, a pioneer in primary storage de-duplication in virtualized server and desktop environments, announced today that Billion Automobile, GMC's fourth largest U.S. dealership, has implemented Tegile's Zebi Storage Array to serve ...
Tags: Tegile Systems, storage de-duplication, virtual desktop
Java's new security settings, designed to block "drive-by" browser attacks, can be bypassed by hackers, a researcher announced Sunday. The news came in the aftermath of several embarrassing "zero-day" vulnerabilities, and a recent ...
Tags: Bug, Moot Java, Anti-Exploit Defense
Using a long phrase or a short sentence as a password may not be as secure as some security experts think. Researchers at Carnegie Mellon University's Institute for Software Research have found that long passwords that incorporate grammar ...
Tags: Password, incorporate grammar, security
Researchers from Security Explorations, a Poland-based vulnerability research firm, claim to have found two new vulnerabilities in Java 7 Update 11 that can be exploited to bypass the software's security sandbox and execute arbitrary code ...
Cisco is investigating a reported vulnerability in Linksys firmware that would allow a hacker to gain full control of the wireless router. Security vendor DefenseCode discovered the flaw and reported it to Cisco "months ago." Because ...
Tags: Cisco, firmware, wireless router, network security
Researchers from a Poland-based vulnerability research firm on Friday announced that they had found vulnerabilities in Java 7 Update 11 that can be exploited to bypass the software’s security sandbox and execute arbitrary code on ...
Tags: Researchers, Java, Security Flaw
A reported vulnerability in Linksys firmware that would allow a hacker to gain full control of the wireless router has led Cisco to launch an investigation, the firm said on Tuesday. Security vendor DefenseCode discovered the flaw and ...
Tags: vulnerability, Linksys firmware, wireless router, Cisco
MRC Technology, a technology transfer charity and company, announced at the end of last year a pound 577,000 funding award from the Biomedical Catalyst. The award has been granted to MRC Technology to fund research into the role of ...