Argus Cyber Security has unveiled a new integrated solution to improve security capabilities of connected vehicles. The solution features Argus Connectivity Protection suite and the highly-integrated Qualcomm Snapdragon 820A processor, a ...
The UK Chancellor has warned of an increased risk of cyber attacks while laying out plans for a previously announced £1.9bn cybersecurity strategy. Philip Hammond said the country must be able to retaliate against cyber-attacks, ...
Tags: Chancellor, Cyber Attacks
Chinese tourists comprised the major consumption force in overseas markets during the seven-day Spring Festival holiday starting from Feb. 7. Chinese purchasing made up 55.8 percent of overseas consumption in the period, reflecting a new ...
Chinese IT companies are acting to defend their country against cyber attack risks, which are increasingly a threat to national security. China Electronics Technology Group Corporation (CETC) signed a memorandum with Microsoft on Thursday ...
Tags: IT companies, cyber attack, cybersecurity
Experts and insiders say with the industry booming in China, the country's plan to modernize its financial services may have just entered a golden era. [Photo: nipic.com] Internet finance has become a hot topic at the ongoing World ...
The N8 Research Partnership has received an £8m grant from the Higher Education Funding Council for England (HEFCE) through its Catalyst Fund to develop its Agri-Food Resilience programme. The N8 Research Partnership, collaboration ...
Tags: HEFCE, Resilience programme, Food
Canada-based International Development Research Centre (IDRC) and Foreign Affairs, Trade and Development Canada (DFATD) have announced to support three new projects to improve food security in developing countries. Supported by the ...
Tags: food security solutions, fruits, mangos, Agriculture
Pessimists are fond of saying that no good deed goes unpunished. An Australian teenager who reported a security vulnerability in a government website and now faces legal troubles probably agrees. Joshua Rogers, a 16-year-old Victoria ...
Tags: Consumer Electronics, Electronics
Smarter, more efficient electricity meters aim to revolutionise energy distribution but WA researchers fear hackers could easily exploit numerous security flaws and wreck havoc on power grids. Smart meters measure a customer's electricity ...
Tags: electricity meters, energy distribution, power grids, security flaws
A security researcher has released software and technical instructions for modifying a drone so that it can identify and hijack other drones. Security researcher Samy Kamkar created the hacker drone, which uses the Parrot AR.Drone 2.0 ...
Facebook and Microsoft are winning plaudits from security researchers for launching an initiative to offer bounties to bug hunters who discover and report vulnerabilities in widely used products. Unlike other bug bounty programmes, the ...
Tags: security, researcher, laud, Microsoft, Facebook, bounty
Microsoft today said that attackers are exploiting a critical and unpatched vulnerability in Office 2007 using malformed documents to hijack Windows PCs, and that Office 2003 and Office 2010 are also vulnerable. The bug can be triggered ...
Tags: Microsoft, software, Computer Products
Spear phishing is one of the most effective ways to break into a corporate network – and recent studies show that employees can be easily tricked on social media to provide the information needed to launch attacks. A phishing attack ...
Tags: Computer Products, software
The New York Times blamed a prolonged website outage on Tuesday on a hacking attack at the company's Australia-based domain name registrar, Melbourne IT. A story published by The Times on Tuesday afternoon quoted the company's CIO, Marc ...
Tags: Computer Products, IT
IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cybersecurity software lab in Israel. The financial terms of the proposed acquisition were not disclosed. With offices in Boston and Tel Aviv, ...