A Philips information management system, which is used in making administrative chores in hospital more efficient, contains vulnerabilities that can be exploited to gain full control of the product, a security vendor said on Thursday. ...
Photo courtesy of Australian Customs and Border Protection Service. Opinion – Paul Zalai, Freight & Trade Alliance (FTA) 2012 ended with significant controversy further questioning the integrity of Australia’s borders. ...
Tags: Australian Customs and Border Protection Service, Sydney airport
STMicroelectronics has introduced high-side switch ICs which can be use to replace conventional relays for vehicle electronics such as lights and body modules. The switches are available in a common package style so that modules suppliers ...
Tags: STMicroelectronics, high-side switch ICs, vehicle electronics
Clariant, a world leader in specialty chemicals, inaugurated a new production site for its Industrial & Consumer Specialties Business Unit (ICS), at the city of Coatzacoalcos, Mexico. Hariolf Kottmann, Clariant CEO, was present on-site to ...
Two U.S. power companies reported infections of malware during the past three months, with the bad software apparently brought in through tainted USB drives, according to the U.S. Department of Homeland Security’s Industrial Control ...
Tags: U.S., bad software, malware
Clariant inaugurated a new production site for its Industrial and Consumer Specialties Business Unit (ICS), at the city of Coatzacoalcos, Mexico. Hariolf Kottmann, Clariant CEO, was present on-site to start its operations and to reassure ...
Tags: Clariant, Production Site, Mexico
Software is the driving force behind the “Internet of everything” says Tyson Tuttle, president and CEO, Silicon Laboratories. The dramatic growth of the Internet over the last 30 years has surpassed the estimates of even ...
Tags: software, Tyson Tuttle, Silicon Laboratories, Internet, hardware
For all the apocalyptic prognostications, 2012 turned out to be a relatively uneventful year from an information security standpoint. A cyber Pearl Harbor did not happen. Stuxnet and its kin did not take out any power grids or shut down ...
Tags: apocalyptic prognostications, 2012, information security, cyber
RF Micro Devices Inc of Greensboro, NC, USA says that RFMD fellow Kevin W. Kobayashi has been named a fellow of the Institute of Electrical and Electronics Engineers by the IEEE board of directors. The IEEE grade of fellow was conferred ...
Tags: RF Micro Devices, Electronics Engineers, IEEE, company news
Taipei, Dec. 28, 2012 (CENS)--Amid fierce patent suits between Apple and Samsung, Taiwan Semiconductor Manufacturing Co. (TSMC) is enhancing its patent firewall by expanding cooperation with third-party silicon IP providers, including ...
Tags: Apple, Samsung, patent suits, silicon IP
Makers are boosting the lighting downstream segment to take advantage of the projected demand upswing in coming years. Taiwan’s LED manufacturers continue to strengthen the components and service segments while pushing for vertical ...
Tags: Taiwan LED
Teledyne Technologies has agreed to acquire LeCroy in a deal valued at $291m. LeCroy, which supplies oscilloscopes and signal analysers, will be merged into Teledyne, a more broad-based instrumentation firm and defence systems supplier. ...
A security researcher claims that he found 23 vulnerabilities in industrial control software from several vendors after a different security company last week showcased vulnerabilities in applications from some of the same manufacturers, ...
Tags: security researcher, vulnerabilities, industrial control software
Shanghai,China–Future Lighting Solutions,along with Creative Technology Hong Kong Limited,completed the successful design of new multi-functional emergency flashlights using LUXEON LEDs,for Vortex. The lights,utilizing LUXEON Rebel ...
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for ...
Tags: CoDeSys, software, ICS, vulnerability