total search58 articles
2015-02-16 | Why is Android an easy target for malware infections? Android phones and tablets are responsible for about 50 per cent of the malware infections observed. Android offers the easiest target for this because of its open app environment. |
2014-12-05 | Whitelist spares users from ICS malware WhiteScope is a database of legitimate files from SCADA and ICS software. It has been created to detect malware and to protect users from cyber threats. |
2015-01-27 | Power grids offer path to effective malware detection PFP Cybersecurity, a security startup, uses trends in power consumption activity, rather than standard malware detection, to spot cyber attacks against power and manufacturing plants. |
2010-07-22 | New Windows OS malware found out Microsoft Corp. has issued an advisory regarding attacks exploiting a vulnerability in Windows Shell, a component of Microsoft Windows. |
2014-11-06 | BlackEnergy malware worms into SCADA systems The malware infects human-machine interfaceswhich provide operator access to and control of the devices within supervisory control and data acquisition system (SCADA)having a direct connection to the Internet. |
2015-04-01 | Significance of protecting enterprise security Security can be attacked at every interface between human and machine, or machine and machine; it needs to be defended at every interface. |
2011-02-21 | Netlogic multicore targets network security apps Integrating 16 NXCPUs and the NETL7 knowledge-based processor, the XLP316S is aimed at next-gen network security appliances, deep-packet inspection gateways, intrusion prevention systems, among others. |
2014-07-21 | Interview: Infineon products take on counterfeiting Infineon is bolstering its Optiga line to protect devices from malware and to control access mechanisms for secure software updates, adding flexibility for adapting to a variety of applications. |
2014-12-08 | Hacker attack on Sony sheds light on total system invasion The company is still reeling from a data breach and a wiper attack since they began Nov. 24, exposing sensitive and confidential data and intellectual property, as well as client information. |
2011-01-13 | Software eases network security Cavium Networks' TurboDPI software solution integrates protocol analysis, application recognition, URL filtering, IDS/IPS and anti-malware. |
2011-06-10 | Intel tech center focuses on secure computing The second science and technology center of Intel will focus on areas PC protection against malware, use of third party applications, mobile device security and protection of personal data. |
2015-11-05 | Xilinx set to demo 16nm All Programmable MPSoCs The latest UltraScale MPSoC architecture extends Xilinx SoCs to enable true heterogeneous multi-processing for various systems including smarter control, vision and network. |
2014-02-07 | Wireless tech seen as threat to manufacturing security The rising use of connected devices is exposing production sites to security breaches and cyber-attacks, compelling firms to seek ways to protect their networks, according to IHS. |
2013-11-12 | Windows XP expiration pushes rethinking of industrial op'n The extended support and availability of security updates for Windows XP will end in April 2014, driving asset owners needing to continue secure operation to think about their course of action. |
2011-08-26 | Wind River, McAfee strengthen security for embedded designs The rise of Internet-enabled devices has given embedded system designers the challenge to incorporate security into their designs. |
2006-06-02 | Vista OS sags, FlexGo scores A new system concept for emerging markets called FlexGo stole the show at Microsoft's Windows Hardware Engineering Conference last month. |
2008-09-05 | V8 powers Google's Chrome The Google Chrome browser is based on a new Javascript virtual machine called V8 developed by Google engineers in Denmark. |
2011-12-22 | USBs, peripherals take center stage USB has become ubiquitous on almost every consumer electronic device, from smartphones to PCs, TVs to game consoles, disk drives to tablets, cameras and much more besides. |
2012-06-13 | The changing landscape of embedded software devt Know the changes to the traditional assumptions that have shaped our thinking about software development. |
2013-09-06 | Static vs dynamic analysis for code devt (Part 2) This second instalment focuses on dynamic code analysis. |
2007-01-05 | Report: Most consumers don't trust their security software A poll of Internet users shows that majority are "not confident" that their security software is protecting them, antivirus vendor Trend Micro reported Tuesday. |
2012-03-13 | Prospects for mobile virtualization Here's a peek at the next phase of bring your own device (BYOD). |
2014-04-02 | Programmable chip safeguards embedded systems Infineon's hardware-based OPTIGA chip provides encrypted communications capability, as well as a full range of security functions including authentication and access control management. |
2010-05-12 | Processor delivers improved content security LSI Corp. has developed the LSI Tarari T2500 content processor that delivers improved network performance and increased security. |
2011-05-17 | Pirated software rate in Hong Kong falls 45% in 2010 A study conducted by Business Software Alliance shows that the percentage of pirated software installed on Hong Kong PCs fell to 45 percent in 2010. |
2012-05-31 | Open Source SDK implements ARM TrustZone Sierraware's open source Open Virtualization software development kit, which lets designers build security into embedded devices in a system-wide manner, is suited for secure payment, authentication, encryption key storage, digital rights management, and license management. |
2014-03-28 | NSA to bug Huawei firmware to spy on potential targets According to documents released by former NSA contractor Edward Snowden, the intelligence agency penetrated the corporate networks of Huawei to build security flaws into the source code. Huawei would then integrate those backdoors in its own products and distribute to a large customer base. |
2010-04-29 | Multicore processors suit enterprise, data center nets LSI Corp. has developed a portfolio of asymmetric multicore silicon solutions and software for use in enterprise and data center networking applications. |
2012-10-03 | Multicore communications processor boasts fortified security Broadcom Corporation's 28nm XLP 200-Series is optimised to meet the demands of enterprise, service provider 4G/LTE, data centre, cloud computing and software defined networking (SDN) environments. |
2007-10-19 | Jobs: Native third party apps welcome on iPhone Apple CEO Steve Jobs disclosed in a statement that the iPhone will be open for native third party applications and that the company plans to have a SDK in their developers' hands by February next year. |
Bloggers Say
See what engineers like you are posting on our pages.