The recently concluded session of the 12th National People's Congress appraised and delineated China's 13th Five-Year Plan (2016-2020) which essentially encompasses the overall development of the country. The Five-Year Plan echoes China's ...
Tags: China's NPC, energy
Philips Hue LED bulbs and other smart home devices that incorporate ZigBee wireless standards are vulnerable to hacking, according to recent findings by IT firm Cognosec. At a Black Hat USA conference in Las Vegas recently Cognosec senior ...
Tags: Security Flaws, ZigBee devices, LED bulbs
Blades which are need to be used for cutting hard, dense and less abrasive materials (such as tiling, hard bricks, stone or old hard concrete), generally require a softer metal matrix. As this will wear down faster, replaces the worn ...
Tags: Saw Blade, Diamond Saw Blade
Thousands of wireless IP cameras connected to the Internet have serious security weaknesses that allow attackers to hijack them and alter their firmware, according to two researchers from security firm Qualys. The cameras are sold under ...
Tags: Wireless IP Cameras, Cameras
The PostgreSQL developers released updates for all major branches of the popular open-source database system on Thursday in order to address several vulnerabilities, including a high-risk one that could allow attackers to crash the server, ...
Tags: PostgreSQL, Computer Products
President Barack Obama's cybersecurity executive order, announced during his State of the Union address Tuesday night, elicited guarded praise from several quarters even as it revived calls for more comprehensive bipartisan legislation to ...
System administrators overseeing Microsoft Exchange deployments should take a close look at Microsoft's latest round of security patches. In addition to covering Windows and Internet Explorer, Microsoft's latest monthly batch of patches ...
The Mega file-sharing service has launched a vulnerability reward program that will pay up to 10,000 euros (around $13,600) for every serious security flaw found in the platform and reported responsibly. The rules of the program were laid ...
Tags: Mega, file-sharing service, vulnerability reward program
Today’s mobile spam and phishing attacks will increasingly delivered by mobile malware networks, despite mobile device operating systems being more secure than those of desktop or laptop computers, a report has found. Blue Coat ...
Tags: mobile spam, mobile, malware networks
Oracle will not stop bundling what critics describe as "crapware" and "foistware" with its Java installer anytime soon, a company representative intimated last week. The practice of offering up other software alongside Java updates, ...
Going on the most recent security flaw in Java, Oracle should rewrite the programming language completely and start again from scratch, according to Bogdan Botezatu, Senior E-Threat Analyst with Bitdefender, a Romanian-based antivirus ...
Tags: Java, security flaw, Oracle, programming language
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber
No matter how advanced our technology gets, passwords remain a weak link when serious security is required. As reported by New Scientist, a group at Stanford University has come up with a possible way around this problem, by developing a ...
Tags: passwords, serious security, brain
Unguarded corporate social media accounts are leaving companies exposed to serious security breaches, a survey of more than 1,000 senior UK executives has revealed. Most respondents (87%) said they use social media strategies to enhance ...
Tags: social media accounts, information security, security scare, network
As the trend for using mobiles in the workplace continues to grow, a new study has found a huge volume of data is being lost by employees taking advantage of the technology. The research from Kroll Ontrack claimed one in eight employees ...
Tags: mobiles, mobile devices, technology malfunctions, critical data