Jomar has announced another major advancement to their lines of injection blow molding machines. Jomar IBM machines now have the capability to export real-time data directly from the machine. This new system is currently available as ...
As a victim of cybercrime in recent years, China chooses not to suffer in silence, but actively fight cybercrime and help govern the cyber community together with the rest of the world. As host of the Second World Internet Conference ...
Tags: Cyberspace, cybercrime, e-business
On the occasion of Philips’ sixth consecutive Cape Town to Cairo roadshow, Philips today unveiled the newly illuminated National Theatre of Ghana. Philips, the global leader in lighting, has provided the theatre with a stunning ...
Tags: Philips, LED Lighting, LED illumination
Verizon on Wednesday became the first major US telecom carrier to release a "transparency report," and said it received 320,000 data queries last year in the United States alone. Verizon also said it received between 1,000 and 2,000 ...
Tags: Consumer Electronics, Electronics
A Russian-speaking group is advertising "bulletproof" hosting for cybercriminals from data centres in Syria and Lebanon, an apparent effort to place new services in locales where Western law enforcement has little influence. The ...
Tags: bulletproof, Russian, cybercriminals, data centre, Internet
Salesforce is taking security on its platform more seriously than ever, with a number of upgrades to its existing two-factor authentication on the horizon, a senior security director told Salesforce 2013 Dreamforce delegates today. ...
Tags: Dreamforce 2013, Tougher Security
Network Solutions is investigating an attack by a pro-Palestinian hacking group that redirected websites belonging to several companies. Owned by Web.com, Network Solutions registers domain names, provides hosting services and sells other ...
Tags: DNS Hijack, Network Solutions
Lands' End has launched an easier and more efficient online shopping experience for international customers. This enhanced shopping technology will benefit consumers all around the world. Customers can now view local pricing the same way ...
Tags: Apparel
The US government made 12,444 requests for data about 40,322 Yahoo users, the web firm has revealed in its first annual transparency report. The report marks a more detailed account of what world governments have requested from Yahoo, ...
Tags: Computer Products, software
A majority of U.S. Internet users polled in a recent survey report taking steps to remove or mask their digital footprints online, according to a report from the Pew Research Center’s Internet Project and Carnegie Mellon University. ...
Tags: Avoid Surveillance, Internet Users
Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps. The ICS ...
The Chinese cyber-spies behind the widely publicised espionage campaign against?The New York Times?have added Dropbox and WordPress to their bag of spear-phishing tricks. The gang, known in security circles as the DNSCalc gang, has been ...
Tags: Computer Products, software
Distributed denial-of-service (DDoS) attacks that could be related have in the past few days slammed the DNS servers of at least three providers of domain name management and DNS hosting services. DNSimple, easyDNS and TPP Wholesale all ...
Tags: DDoS Attacks, DNS
A proposal in Taiwan to enforce copyright laws by blocking access to top piracy sites is facing concerns that the measures could impinge on Internet freedoms on the island. The intellectual property office of Taiwan's Ministry of Economic ...
Tags: Anti-Piracy Proposal, Taiwan, SOPA
Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
Tags: Computer Products, software