Subaru America has announced pricing for 2017 WRX and WRX STI models, featuring safety technology, including Blind Spot Detection and Rear Cross Traffic Alert. The 2017 models will arrive at Subaru retailers this summer. Subaru ...
Tags: Subaru, WRX, WRX STI models, Blind Spot Detection
The Goodyear Tire & Rubber Company has unveiled two new shaped tires concepts for future autonomous vehicles at the 2016 Geneva International Motor Show in Switzerland. The concepts, the Eagle-360 and IntelliGrip, are expected to reshape ...
Michael Lippert, of Saft Energy Storage Systems, explains how the SmartRegion Pellworm project will enable an island off the North Sea coast of Germany to increase self-consumption of its own renewable energy Pellworm Island presents a ...
Tags: Blueprint, SmartRegion Pellworm project, Michael Lippert
The Chinese cyber-spies behind the widely publicised espionage campaign against?The New York Times?have added Dropbox and WordPress to their bag of spear-phishing tricks. The gang, known in security circles as the DNSCalc gang, has been ...
Tags: Computer Products, software
Security monitoring – the type involving traditional security information and event management (SIEM) – can be done in some public cloud environments, according to Gartner. And if you're using public cloud services, it's time to ...
Tags: Security, Public Cloud
McAfee plans to acquire Stonesoft, a Helsinki-based maker of firewalls, for US$389 million in cash, the companies said Monday. The Intel subsidiary said firewalls are one of the fastest growing products in network security, which it plans ...
Tags: McAfee, Stonesoft, Computer Products
Organizations face malware-related events that bypass traditional defense technologies on their networks every three minutes, according to a new report released Wednesday by security vendor FireEye. "This activity can include the receipt ...
Tags: Computer Products, software
HP on Monday unveiled its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary with its ArcSight security-event and information management (SIEM) can ...
Tags: HP, Big Data Security Strategy, SIEM
According to a new report from Gartner, hackers are adapting distributed denial of service (DDoS) attacks and combining these with social engineering tactics to try and infiltrate banks. The report, called Arming Financial and E-Commerce ...
A report by Gartner predicts that the number of sophisticated attacks on e-commerce and financial industries will increase in 2013. According to Gartner, during these incidents attackers will send out targeted commands to the memory of ...
Tags: e-commerce industrie, financial industrie, applications
Cyber attacks on U.S. banks over the last several months reflect a frightening new era in cyber warfare, according to security expert Darren Hayes, who says that corporations are unprepared to battle such attacks because of a shortage of ...
Tags: cyber attacks, U.S.banks, DDoS Bank
that need to be considered in the design of,and the installation and wiring of,electrical emergency escape lighting systems,in order to provide the lighting performance needed for safe movement of people in the event of the supply to normal ...
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for ...
Tags: CoDeSys, software, ICS, vulnerability
Advanced malware that evades signature-based detection has increased nearly 400% in the past year, research by security firm FireEye has revealed. Companies are being hit by an average of 643 successful infections a week, according to the ...
Tags: FireEye, cyber attack, firewalls, intrusion prevention systems