CSO-It was almost a year ago that a curious mathematician with no real Internet security training was able to walk through a gaping security hole left by Google--a weak email cryptographic key. But most security experts say that while the ...
Tags: Google, Email Security, Catastrophe, Internet security
IDG News Service-Open and misconfigured DNS(Domain Name System)resolvers are increasingly used to amplify distributed denial-of-service(DDoS)attacks,according to a report released Wednesday by HostExploit,an organization that tracks ...
Tags: DNS, DDoS, Internet, World Hosts Report
In the last quarter, LED-based sales at Philips were 24% of total lighting sales. Also, the company has published a paper with Cisco that discusses connected public LED lighting in cities. Philips' ...
Tags: LED Light
Royal DSM announced that it is increasing the installed manufacturing capacity for KhepriCoat anti-reflective coating. The additional capacity is expected to be on stream by the end of 2012 at the Chemelot site in Geleen, the Netherlands. ...
Tags: DSM, KhepriCoat anti-reflective coating, IP protected product
In the future, we're told, homes will be filled with smart gadgets connected to the Internet, giving us remote control of our homes and making the grid smarter. Wireless thermostats and now lighting appear to be leading the way. ...
Tags: LED Light Bulb
EE has released its tariffs for the UK's first 4G contracts, which will be available from the end of October. EE – created from the merger of T-Mobile and Orange and formerly known as Everything Everywhere – has outlined price ...
Tags: EE, 4G pricing plans, corporate contracts, data allowances
Oracle is pushing its combined hardware and software product range as a way for CIOs to avoid costly consultant fees. Speaking in the UK, Oracle president Mark Hurd, said open systems were more costly because they were not ...
Tags: Oracle, CIOs, consultant fees, Mark Hurd
Chinese firm ZTE is planning to grow its UK presence by selling its technology to local government and schools, despite the recent controversy around the security of its products. ZTE is predominantly known as a manufacturer of consumer ...
Tags: ZTE, consumer mobile handsets, switches, video-conferencing tools, CCTV
In an exclusive interaction,Ravishankar,CEO&Co-Founder,Nevales Networks speaks about the company's value proposition as the defacto managed service provider for SMBs in India.The Indian company is sure about the success of ...
Tags: SMB, IT infrastructure, cloud, Nevales
Security researchers from Kaspersky Lab have identified another piece of malware targeting the Middle East that is likely part of the interrelated cyberespionage efforts behind Stuxnet, Duqu, Flame and Gauss. The malware was dubbed ...
Tags: Kaspersky, malware, code, espionage tool, USB disks
A second-hand laptop purchased on auction site eBay has been found to contain over 5GB of confidential information relating to global telecoms company Alcatel-Lucent. The files,shown exclusively to Computing,include service,fault and ...
IMS Research projects that 2013 will be a big year for the emergence of Radio Frequency (RF)-embedded light bulbs, with several large manufacturers planning to release new products using a range of wireless technologies. According to IMS ...
Tags: LED Bulb
Analyst: LED phosphor market to reach $1BN by 2015 10 Oct 2012 But Yole Développement report says that shortage of rare-earth elements could persist as incandescent lamps are phased out. The market for phosphors used in ...
Tags: LED
Agri-business giant Syngenta has put multi-sourced IT at the heart of its ambitious plan to double its revenues in the next eight years. It has moved from having thousands of suppliers across the world to a selected few who it has close ...
Tags: Syngenta, Multi-Sourcing, telephony systems
An international gang of cyber crooks is plotting a major campaign to steal money from the online accounts of thousands of consumers at 30 or more major U.S.banks,security firm RSA warned. In an advisory Thursday,RSA said it has ...
Tags: Cybercriminal, Trojan Attack, international gang of cyber crooks, RSA