ARM buys imaging company Apical

arm-logo

British chip maker ARM has announced that it has acquired Apical, an imaging and embedded computer vision company. The deal, worth $350 million in cash, was closed on Tuesday, May 17, the company said.

Apical’s products are used in smartphones everywhere (1.5 billion, according to ARM), and in 300 million other devices, all over the world, including IP cameras, digital cameras and tablets.

Continue reading

Trojan hijacks search results to generate advertising revenue

Trojan horse

There’s a Trojan out there that forces infected computers to automatically click on advertising banners. By doing so, its creators are earning money while businesses paying to be seen are just burning a hole in their budgets without achieving anything.

Those are the results of a new report by security firm Bitdefender, which has identified the Trojan as Redirector.Paco. According to the company’s press release, the Trojan has, since 2014, infected 900,000 machines.

Continue reading

McAfee's new security hub gives you tips on how to stay safe online

cloud encryption

Security experts at McAfee have unveiled a new cyber-security education hub, aimed at making people stay safer online. It is called the Ultimate Guide to Security Threats.

The security firm decided to create the hub after realizing that many people are still fairly uneducated when it comes to cyber-security. At the same time, cyber-crime is growing at an unprecedented rate.

Continue reading

Hacker makes millions, still lives with his mother

hacker-credit-card

Hacking into newswire services can land you a 20-year prison sentence, in case you didn’t know. And this is exactly what 28-year-old Ukrainian hacker Vadym Iermolovych is facing.

The hacker pleaded guilty in a federal court in Newark, New Jersey, on Monday, on the case of making $30 million by trading non-public information about corporate earnings.

Continue reading

China’s security reviews target foreign tech products

Access to Gmail is blocked in China

The Chinese government is quietly scrutinizing foreign technology products sold in the country, the New York Times has reported.

According to the report, executives from companies like Apple are being called in by a Cyberspace Administration of China committee to explain, in person, things like encryption and data storage.

Continue reading

Google faces €3 billion antitrust fine in Europe

Google to cough up $19 million in kids' in-app purchases case

Google may soon face a record €3 billion fine from the European antitrust authorities over how it abused its control of the online search market in the EU.

This will be the highest fine the European Commission has ever issued as an antitrust punishment. In addition to the fine, Google will be banned from manipulating its search results to favor itself over its rivals.

Continue reading

UK will introduce digital driver's license in 2018

UK digital drivers-license

The days when you forget your driver’s license and ending up paying a fine for it might soon be a thing of the past, as there are people out there working on a paperless version of the license.

According to a BBC report this week, the UK’s Driver and Vehicle Licensing Agency is working on such a project, and there’s already a prototype in place. A photo of the prototype was tweeted recently by CEO Oliver Morley.

Continue reading

No UK tech unicorn is publicly in favor of a Brexit

Brexit EU European Union flag UK

This morning I wrote a report on how just a third of UK’s companies actually have a plan in place in case the country leaves the European Union, following the Brexit referendum in some six weeks’ time.

At the same time, Guardian reached out to UK’s unicorn companies -- those valued at more than a billion dollars -- about their opinion on the Brexit, and those that were willing to speak were firmly against the UK leaving the European Union.

Continue reading

Amazon will sell private-label brands to Prime subscribers

Amazon logo

Amazon is preparing to expand its business with the addition of several new lines of private label brands that it will begin selling in the coming weeks.

The company’s private brands will initially be available to Amazon Prime subscribers and will include perishable foods, tea and coffee, vitamins and baby food as well as other household items such as laundry detergent and diapers.

Continue reading

98 percent of Brits are happy with their bank

Happy mobile user

Pretty much everyone in the UK is satisfied with their banks and the services those banks offer, Juniper Research confirmed this week.

According to the market analysts' research, 98 percent of those surveyed said they were either "happy", or "quite happy" with their service. Juniper failed to mention the size of the group it surveyed, though.

Continue reading

9 tips to improve your smartphone's battery life

iPhone hand

You’re really concerned about your battery life, aren’t you? That’s right, when it’s time to travel or go out, you always remember two things -- your toothbrush and your charger! The toothbrush to make your morning fresh and the charger to save you from the irritation of the diminishing smartphone battery during your working day.

Battery life has been one of the most important concerns for users, app developers, and manufacturers. On average, most smartphone batteries last 1-2 days before being completely depleted. In smartphone reviews we see how battery life can outrank other features -- after all, if the battery’s dead we can’t use them for those important calls or emails! While we wait for any latest technology to come to market, let’s look at some easy ways to conserve battery life. These tips will definitely help to make you feel relaxed and anxiety-free till you return safely to your charger.

Continue reading

Security Analytics: What it is and what it is not

security magnifying glass

There’s a misconception in the cyber security industry that many IT, security executives and vendors subscribe to.  They equate security analytics to SIEM and user and entity behavior analytics (UEBA). They use the three terms interchangeably as if they are all one of the same and solve the same problems. As a result, companies waste time, leave gaps in their visibility, ability to execute and ultimately fail to minimize their cyber risk.

In a report released this month, analyst firm Forrester states, "Security analytics has garnered a lot of attention during the past few years. However, marketing hype and misunderstandings regarding security analytics have confused the market, making it difficult for security and risk leaders to make information decisions". This statement couldn’t be truer. UEBA and SIEM tools are supporting components of security analytics, but are not equivalent.

Continue reading

Google will pay you $20 an hour to sit in a self-driving car

Google's self-driving car cars fleet Lexus

As Google prepares to deploy its self-driving car fleet to Chandler, Arizona, the company is hiring local drivers to test its vehicles.

The company intends to hire local drivers in Arizona who will act as "vehicle safety specialists" that will be behind the wheel of its self-driving cars and ready to take over should an unforeseen problem or circumstance arise.

Continue reading

DRaaS is the low-cost insurance policy for 'always-on' IT

disaster plan

Disaster. The term itself inspires worry and downright fear for most IT pros -- and for good reason. Whether it’s a security breach, networking failure, human error or the much-dreaded natural disaster, outages can be financially devastating for IT-centric businesses. While acts of nature are rare, IT failures are inevitable, and most companies experience them multiple times every year.

Despite the pervasive risks, close to 75 percent of companies are failing in their disaster readiness efforts, according to the Disaster Recovery Preparedness Council. How you prepare for this scenario and what continuity solution you choose for recovery will determine if your outages lasts for minutes, hours or days.

Continue reading

7-Zip gets an update to fix major security vulnerabilities

Security Lock

Security researchers from Talos have written a bunch of fancy words on their blog here, which basically say 7-Zip has a couple of serious security flaws.

Everyone’s up in arms about it, too.

Continue reading

Load More Articles