German-based CDA, a specialist for complex multi-μ-functional solutions on plastics, and Hacker Automation have entered into a collaboration agreement in the fields of lab-on-a-chip and embedded diagnostic systems. Hacker Automation is ...
Tags: diagnostic systems, micro-optical, spectroscopic, printed electronic
A suspected hacking attack has hit a UN agency meeting in Dubai at which delegates are discussing new telecommunications controls that could alter the way the internet is governed. Among other groups,European MPs have voiced concerns that ...
Tags: Hackers, internet governance, ITU, WCIT organisers
Beer tent reduces CO2 by the equivalent of 600,000 1-liter beer mugs using 550 energy-efficient Osram LED lamps When millions of visitors start streaming into the world's biggest fair from September 22 to October 7, attention will center ...
Tags: LED lamps, warm-white LED lamps, LEDs
IDG News Service-A group of hackers leaked email contact information of experts working with the International Atomic Energy Agency(IAEA)after breaking into one of the agency's servers. The group published a list of 167 email addresses ...
Tags: computer systems, computer data, computer, information security
IDG News Service-The Romanian domain names of Google,Yahoo,Microsoft,Kaspersky Lab and other companies were hijacked on Wednesday and were redirected to a hacked server in the Netherlands. The hijacking occurred at the DNS(Domain Name ...
Tags: Attackers hijack, hacked server, Netherlands, security breach
South Carolina's governor faulted an outdated Internal Revenue Service standard as a contributing factor to a massive data breach that exposed Social Security numbers of 3.8 million taxpayers plus credit card and bank account data. ...
Tags: South Carolina, IRS, malware, 7-Zip to compress information
A man who exposed a major privacy weakness that divulged email addresses of iPad users on AT&T's network plans to appeal his conviction on two felony charges. Andrew Auernheimer,also known as"weev,"used an automated scripting tool called ...
Tags: iPad, hacker, AT&T's network plans, Andrew Auernheimer
IDG News Service - Adobe has shut down Connectusers.com, a community forum site for users of its Adobe Connect Web conferencing platform, because the site's user database was compromised. On Tuesday, a hacker named "ViruS_HimA" claimed ...
Tags: Confirms, Connectusers, community forum
Twitter has apologised after telling members their accounts had been hacked and forcing them to reset their passwords. Twitter sent out a"large number"of emails telling members to change their log-in details,but gave no indication of the ...
Tags: Twitter, apologises, unnecessary hacking warnings, protect users
Cybercriminals are using a new PDF exploit that bypasses the sandbox security features in Adobe Reader X and XI, in order to install banking malware on computers, according to researchers from Russian security firm Group-IB. The zero-day ...
Tags: PDF, Cybercriminals, Adobe Reader, Group-IB
It's not exactly the type of advertisement most people would understand. For sale:"Our first 0day for Win8+IE10 with HiASLR/AntiROP/DEP&Prot Mode sandbox bypass(Flash not needed)."It's part of a recent message on Twitter from Vupen,a ...
Tags: Windows 8, Zero-Day Vulnerability, Vupen, computer security research
The Department of Homeland Security(DHS),struggling to find enough cybersecurity talent to meet its needs,says it is going to groom the next generation of cybersecurity pros starting in kindergarten. But several security experts say while ...
Tags: DHS, kindergarten, cybersecurity pros, NICE
While the risk of being hacked,conned or having sensitive information stolen is possible all through the year,most security experts agree that the holiday season brings a spike in fraudulent activity,both online and off. CSO compiled a ...
Tags: Christmas, Fraudulent auction, payment sites
Some Web browsers can be tricked into using so-called malicious extensions that can give hackers the ability to hijack the user's session,spy on webcams,upload and download files,and in the newer mobile-device area,hack into Google Android ...
Tags: zombie browsers, malicious extensions, advanced persistent threat, Chrome
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft,data theft,snooping,impersonation and malware infection.That's why so many people rely on public virtual private network services,but VPNs are no ...
Tags: Computer, VPN, public Wi-Fi hotspot, security