Monthly Archives: October 2013

malware

Twin Campaigns Compromise Websites to Infect Visitors

0
A malware campaign has infected at least 40,000 Web pages in the past two weeks with malicious code that could infect visitors' computers with...

Tablets in High Demand, but Many Don’t Pay for a Data Plan: CEA

0
Tablets are the most desired gift on consumers’ tech gift wish lists this year, according to Consumer Electronics Association’s (CEA) 20th Annual consumer electronics...

Samsung Hosts First Dev Event, Pushing Its Reach, Connectedness

0
Samsung hosted its first-ever global developer conference this week in San Francisco, where it provided developers with a host of tools for developing new...

SAP Adds Five New Applications for Its HANA Database

0
SAP on Oct. 30 made available four new big data-capable applications for its HANA in-memory database related to customer engagement intelligence and one application...

German Chancellor’s BlackBerry Likely Withstood NSA Tapping: Vendor

0
When the news broke that the U.S. National Security Agency was tracking the mobile communications of German Chancellor Angela Merkel and other foreign leaders,...

Facebook Revenue Climbs 60 Percent, Led by Mobile Ads

0
Facebook's mobile advertising strategy, which some analysts believe should have been in place before it went public in May 2012, is now beginning to...
linux

Why Is the Linux Foundation Growing?

0
Linux is one of the world's leading operating systems powering much of the Internet and rapidly becoming a core mobile and embedded technology, as...

Intel to Make 64-Bit ARM Chips for Altera

0
Intel and ARM compete in an increasingly growing number of areas including smartphones, tablets and microservers, as well as embedded devices and the Internet...

Wheeler Confirmed to FCC as Industry Readies for Auction

0
The U.S. Senate has confirmed Tom Wheeler as the new chairman of the Federal Communications Commission (FCC) and Michael O'Rielly as its newest commissioner.Wheeler...
security

Building Security in Maturity Model Includes Bug-Bounty Programs

0
How do some of the best organizations in the world deliver and provide security for their own enterprises? That's a question that the annual...