Monthly Archives: August 2015

Android security

Android Phones’ Fingerprint Sensors Vulnerable to Hackers

0
Android users have a new security issue to worry about, this time involving fingerprint sensors that could allow hackers to copy a user's fingerprint...
Intel logo

Intel Expands Efforts to Diversify Workforce

0
Intel last week stepped up its efforts to bring more minorities and women into the tech field and into the company, giving employees greater...
Syntasa Analytics 2

Syntasa Aims to Unlock Big Data Value With Marketing as a Service

0
Business intelligence tools have long been important to helping companies spot buying patterns, product return rates and other information useful in product development and...
Microsoft logo

Microsoft Offers Open-Source Windows Bridge for iOS

0
Microsoft this week delivered on its vision of building bridges to non-Microsoft platforms with an early version of its bridge for running iOS apps...
bug bounty

Microsoft Puts a Bigger Bounty on Bugs

0
Microsoft is increasing the rewards for security pros who help harden its Windows operating system technologies."We are raising the Bounty for Defense maximum...
GasPot Attack 2

Cyber-Attackers Targeting Web-Connected Fuel Tanks, Experiment Finds

0
Attackers have begun targeting fuel-tank monitoring systems, which are known to be vulnerable to manipulation, researchers at security firm Trend Micro stated in a...
Daily Video 807B

Microsoft Brings Outlook Email to Apple Watch

0
Today's topics include the availability of Outlook for Apple Watch, EMC looks to VMware for a possible buyout, Xiaomi is preparing to produce its...
networking

Qualcomm to Buy Ikanos to Grow Broadband Portfolio

0
Qualcomm is looking to grow its capabilities in the home gateway market and the Internet of things through its decision to buy Ikanos Communications...
IBM big data

IBM’s $1B Medical Imaging Buy Lets Watson ‘See’

0
IBM announced that its Watson cognitive computing system will gain the ability to "see" by bringing together Watson's image analytics capabilities with data and...
2

Black Hat, DefCon Put Car Hacking, Web Privacy on Center Stage

0
Black Hat, DefCon Put Car Hacking, Web Privacy on Center Stage Car hacking was a key theme at the two Las Vegas security conferences this...