Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer. Most financial Trojan ...
Africa has become a battleground for low-to-mid-range smartphones following high-profile launches of products from leading manufacturers in the last two months. In Kenya last month, Safaricom, the region's largest mobile carrier, launched ...
Tags: smartphones, Africa, mobile
The head of IBM's mainframe group is looking to bring mobile and social workloads into the platform in another move that would help the mainframe stay relevant and fend off competition from lower-cost systems. The mainframe has confounded ...
Using a smartphone to pay for purchases in lieu of a physical debit or credit card may become a US$1 trillion business by 2015, and some ancillary technologies for consumer engagement could help to make that happen. Shopping for products ...
Tags: smartphone, ancillary technologies, consumer engagement
Children as young as 11 years old are developing malicious code to steal personal information from online gamers, according to antivirus software provider AVG. The Q4 2012 Community Powered Threat Report reveals some schoolchildren have ...
Tags: AVG, malicious code, cyber security
Computer security guru Professor Ross Anderson has criticised the European Union's proposed computer security directive which, he says, represents "yet another unfortunate step towards the militarisation of cyberspace". EU security ...
Cotton Australia is working with state and local authorities to help Queensland grower’s access emergency flood relief, while the banking sector has also stepped up to offer relief packages. Recent flooding has impacted much of ...
Tags: Cotton Australia, grower, flood relief
Mailing your cellphone to a recycling company might make you a few pounds, but it can leave you at risk of identity theft. The deletion techniques recycling companies use are meant for hard discs, and so don't work on the solid-state flash ...
Tags: cellphone, deletion techniques, flash memory
Financial malware authors are returning to traditional, phishing-like, credential-stealing techniques in order to evade detection, according to researchers from security firm Trusteer. Most financial Trojan programs used by cybercriminals ...
Tags: Financial malware, credential-stealing techniques, detection
Renault-Nissan Alliance (Alliance) has agreed to form a new joint venture (JV) with Italian bank Unicredit provide loans to vehicle customers and dealers in Russia. The new JV, which will be 60% owned by the Alliance and 40% by UniCredit, ...
India’s Gem & Jewellery (G&J) sector witnessed another volatile year with weaker rupee and sluggish global economy adding more agony to its exports which declined by 17.09% in dollar terms and 4.65 per cent in rupee terms in 2012. ...
I3 Solutions Group the vendor neutral critical IT and facilities consultancy - announces the appointment of banking sector IT guru Shaun Barnes as its UK and EMEA managing director MANCHESTER, ENGLAND, February 09, 2013 /24-7PressRelease/ ...
Tags: Shaun Barnes, EMEA, I3 Solutions Group
HOUSTON — January 11, 2013 — The M&G Group ("M&G"), one of the three leading producers in the Americas of PET for packaging applications, announced today that it has signed a US$ 1 billion engineering, procurement and ...
Tags: M&G, Sinopec Engineering, Textile
President Obama on Wednesday nominated REI's chief executive, Sally Jewell, to become U.S. Secretary of the Interior. Jewell, who has been at REI for eight years, also has experience in the banking and oil industries. The nomination must ...
The U.S. Mission in Iraq, through the United States Agency for International Development’s (USAID) Financial Development Project, is working with the Iraqi banking industry to help banks improve best practices. The U.S. Mission ...
Tags: US, Financial Sector, Iraq