Global Sources
EE Times-Asia
Stay in touch with EE Times Asia
EE Times-Asia > Advanced Search > malware

malware Search results

?
?
total search58 articles
2015-02-16 Why is Android an easy target for malware infections?
Android phones and tablets are responsible for about 50 per cent of the malware infections observed. Android offers the easiest target for this because of its open app environment.
2014-12-05 Whitelist spares users from ICS malware
WhiteScope is a database of legitimate files from SCADA and ICS software. It has been created to detect malware and to protect users from cyber threats.
2015-01-27 Power grids offer path to effective malware detection
PFP Cybersecurity, a security startup, uses trends in power consumption activity, rather than standard malware detection, to spot cyber attacks against power and manufacturing plants.
2010-07-22 New Windows OS malware found out
Microsoft Corp. has issued an advisory regarding attacks exploiting a vulnerability in Windows Shell, a component of Microsoft Windows.
2014-11-06 BlackEnergy malware worms into SCADA systems
The malware infects human-machine interfaceswhich provide operator access to and control of the devices within supervisory control and data acquisition system (SCADA)having a direct connection to the Internet.
2015-04-01 Significance of protecting enterprise security
Security can be attacked at every interface between human and machine, or machine and machine; it needs to be defended at every interface.
2011-02-21 Netlogic multicore targets network security apps
Integrating 16 NXCPUs and the NETL7 knowledge-based processor, the XLP316S is aimed at next-gen network security appliances, deep-packet inspection gateways, intrusion prevention systems, among others.
2014-07-21 Interview: Infineon products take on counterfeiting
Infineon is bolstering its Optiga line to protect devices from malware and to control access mechanisms for secure software updates, adding flexibility for adapting to a variety of applications.
2014-12-08 Hacker attack on Sony sheds light on total system invasion
The company is still reeling from a data breach and a wiper attack since they began Nov. 24, exposing sensitive and confidential data and intellectual property, as well as client information.
2011-01-13 Software eases network security
Cavium Networks' TurboDPI software solution integrates protocol analysis, application recognition, URL filtering, IDS/IPS and anti-malware.
2011-06-10 Intel tech center focuses on secure computing
The second science and technology center of Intel will focus on areas PC protection against malware, use of third party applications, mobile device security and protection of personal data.
2015-11-05 Xilinx set to demo 16nm All Programmable MPSoCs
The latest UltraScale MPSoC architecture extends Xilinx SoCs to enable true heterogeneous multi-processing for various systems including smarter control, vision and network.
2014-02-07 Wireless tech seen as threat to manufacturing security
The rising use of connected devices is exposing production sites to security breaches and cyber-attacks, compelling firms to seek ways to protect their networks, according to IHS.
2013-11-12 Windows XP expiration pushes rethinking of industrial op'n
The extended support and availability of security updates for Windows XP will end in April 2014, driving asset owners needing to continue secure operation to think about their course of action.
2011-08-26 Wind River, McAfee strengthen security for embedded designs
The rise of Internet-enabled devices has given embedded system designers the challenge to incorporate security into their designs.
2006-06-02 Vista OS sags, FlexGo scores
A new system concept for emerging markets called FlexGo stole the show at Microsoft's Windows Hardware Engineering Conference last month.
2008-09-05 V8 powers Google's Chrome
The Google Chrome browser is based on a new Javascript virtual machine called V8 developed by Google engineers in Denmark.
2011-12-22 USBs, peripherals take center stage
USB has become ubiquitous on almost every consumer electronic device, from smartphones to PCs, TVs to game consoles, disk drives to tablets, cameras and much more besides.
2012-06-13 The changing landscape of embedded software devt
Know the changes to the traditional assumptions that have shaped our thinking about software development.
2013-09-06 Static vs dynamic analysis for code devt (Part 2)
This second instalment focuses on dynamic code analysis.
2007-01-05 Report: Most consumers don't trust their security software
A poll of Internet users shows that majority are "not confident" that their security software is protecting them, antivirus vendor Trend Micro reported Tuesday.
2012-03-13 Prospects for mobile virtualization
Here's a peek at the next phase of bring your own device (BYOD).
2014-04-02 Programmable chip safeguards embedded systems
Infineon's hardware-based OPTIGA chip provides encrypted communications capability, as well as a full range of security functions including authentication and access control management.
2010-05-12 Processor delivers improved content security
LSI Corp. has developed the LSI Tarari T2500 content processor that delivers improved network performance and increased security.
2011-05-17 Pirated software rate in Hong Kong falls 45% in 2010
A study conducted by Business Software Alliance shows that the percentage of pirated software installed on Hong Kong PCs fell to 45 percent in 2010.
2012-05-31 Open Source SDK implements ARM TrustZone
Sierraware's open source Open Virtualization software development kit, which lets designers build security into embedded devices in a system-wide manner, is suited for secure payment, authentication, encryption key storage, digital rights management, and license management.
2014-03-28 NSA to bug Huawei firmware to spy on potential targets
According to documents released by former NSA contractor Edward Snowden, the intelligence agency penetrated the corporate networks of Huawei to build security flaws into the source code. Huawei would then integrate those backdoors in its own products and distribute to a large customer base.
2010-04-29 Multicore processors suit enterprise, data center nets
LSI Corp. has developed a portfolio of asymmetric multicore silicon solutions and software for use in enterprise and data center networking applications.
2012-10-03 Multicore communications processor boasts fortified security
Broadcom Corporation's 28nm XLP 200-Series is optimised to meet the demands of enterprise, service provider 4G/LTE, data centre, cloud computing and software defined networking (SDN) environments.
2007-10-19 Jobs: Native third party apps welcome on iPhone
Apple CEO Steve Jobs disclosed in a statement that the iPhone will be open for native third party applications and that the company plans to have a SDK in their developers' hands by February next year.
Bloggers Say

Bloggers Say

See what engineers like you are posting on our pages.

?
?
Back to Top