Computerworld-SugarSync today released the public beta of a complete revamp of its cloud storage and content-sharing service that replaces its file directory-style look with a GUI-style menu along with drag and drop file transfer features. ...
Tags: Sugarsync, Sharing Service, search functionality, cloud storage
The release of GAN-on-silicon LED chips in China presents a lower-cost alternative that is comparable in quality to mainstream products based on sapphire and SiC substrates. R&D work leveraging the advantages of silicon substrates has ...
Tags: led chip
Computerworld-A federal judge has temporarily blocked enforcement of a provision in a just-enacted California state law that requires all registered sex-offenders to immediately turn over the all of their Internet identifiers and the names ...
Tags: federal judge, Human Trafficking Law, Internet service
Computerworld-The move to allow voters in New Jersey to cast their votes via email or fax may be running into early problems,according to reports. BuzzFeed this morning reported that voters in New Jersey's Morris and Essex Counties were ...
Tags: Email Voting, N.J., Sparks Security, fax
About 200 Android applications hosted on Google Play create spoofed SMS messages on the devices on which they are installed,according to security researchers from antivirus vendor Symantec. This technique can theoretically be used for SMS ...
Tags: Android applications, Google, SMS
Infoworld - Thinking about the bits of data you leave behind is a one-way ticket to paranoia. Your browser? Full of cookies. Your cellphone? A beacon broadcasting your location at every moment. Search engines track your every curiosity. ...
Tags: Tracks, Online, one-way ticket
The 2011 security breach at Dutch certificate authority(CA)DigiNotar resulted in an extensive compromise and was facilitated in part by shortcomings in the company's network segmentation and firewall configuration,according to Fox-IT,the ...
Tags: DigiNotar, Fox-IT, security breach, CA server
RF Micro Devices Inc of Greensboro,NC,USA has launched the RFFM6901,a single-chip RF front-end module(FEM)for applications in the 868/915MHz ISM(industrial,scientific&medical)band as well as in wireless automatic metering ...
RTI Biologics has introduced a new ready-to-use demineralized bone matrix (DBM) implant for use in sports medicine, orthopedic and spine surgeries. The new biologic implant, BioReady DBM Putty and Putty with Chips, is a 100% allograft ...
Taipei, Oct. 23, 2012 (CENS)--Inotera Memories Inc. recently announced its board of directors has approved a proposal to increase investment in 30nm process with the aim of migrating all of its monthly capacity of 120,000 wafers to the ...
Tags: Inotera Memories Inc, 30nm process, chips for servers, chips, DRAM
CSO-It was almost a year ago that a curious mathematician with no real Internet security training was able to walk through a gaping security hole left by Google--a weak email cryptographic key. But most security experts say that while the ...
Tags: Google, Email Security, Catastrophe, Internet security
IDG News Service-Open and misconfigured DNS(Domain Name System)resolvers are increasingly used to amplify distributed denial-of-service(DDoS)attacks,according to a report released Wednesday by HostExploit,an organization that tracks ...
Tags: DNS, DDoS, Internet, World Hosts Report
Microsoft's Windows 8 is seen by many as representing an evolutionary jump for the operating system (OS), but what about security? Has there been an evolutionary leap there? In the run-up to the launch, much has been said about the new ...
Tags: Microsoft, Windows 8, operating system, user interface
A fifth of lost electronic devices have access to work email,exposing confidential corporate information,a Sophos survey has revealed. Some 42%of lost devices do not have any basic security measures in place,according to a survey ...
Tags: electronic devices, work email, security, Sophos
Security researchers from Kaspersky Lab have identified another piece of malware targeting the Middle East that is likely part of the interrelated cyberespionage efforts behind Stuxnet, Duqu, Flame and Gauss. The malware was dubbed ...
Tags: Kaspersky, malware, code, espionage tool, USB disks