Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
eWEEK.com
Search
eWEEK.com
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Holiday Shoppers Face New Point-of-Sale Malware Threats

    By
    EWEEK STAFF
    -
    November 16, 2015
    Share
    Facebook
    Twitter
    Linkedin

      Today’s topics include the emergence of new POS malware, the perks of Google’s About Me tool, Samsung’s Exynos 8 Octa mobile chip, and ARM math libraries will improve speeds of high-performance computing applications.

      Ever since the Target data breach was first revealed in December 2013, there has been a heightened awareness around point-of-sale malware.

      Now, a few short weeks before the 2015 holiday shopping season starts in earnest, multiple security firms are sounding the alarm on POS malware that is both old and new.

      Trustwave, the security firm that first publicly identified the Backoff POS malware that affected more than 1,000 U.S businesses in 2014, is now warning about the Cherry Picker POS malware. Cherry Picker will run on most Microsoft Windows operating systems.

      Internet users worried about Google publicly sharing their personal information now have a way of controlling what others can see of that information.

      The company has quietly rolled out a new About Me tool in which individuals can get a consolidated view of the personal data that Google has on them.

      This includes their birthday, home address, work history, gender, their social media sites and places they have previously lived. Individuals can use the tool to turn on privacy settings for information that they do not wish others to see, or to edit and update incorrect or outdated information.

      Later this year, Samsung Electronics will begin mass producing its latest Exynos smartphone processor. It will be the first in the vendor’s lineup to feature a custom core of its own design, a move that is in line with other ARM based chip makers like Qualcomm and Apple.

      The 64-bit Exynos 8 Octa 8890 is an eight-core processor that will continue to use ARM’s big.Little architecture to drive performance and power efficiency.

      However, while the four “little” cores will still be ARM’s Cortex-A53 CPUs, the four “big” cores will feature Samsung’s first custom-designed CPU that reportedly has been in the works for two years.

      At the SC 15 supercomputing show in Austin, Texas, which started yesterday, ARM will showcase its latest move in the high-performance computing space: new math libraries tuned for 64-bit processors built on the ARMv8-A architecture.

      According to the company, the ARM Performance Libraries are key math routines designed to improve the performance of computational software running on ARM-based high performance computing systems.

      It’s a move that illustrates the importance of software as ARM pushes to make inroads in the HPC space against Intel.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      CHRIS PREIMESBERGER - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      CHRIS PREIMESBERGER - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      EWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      ZEUS KERRAVALA - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      WAYNE RASH - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Info

      © 2020 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×