Marketing

Hack mobile point-of-sale systems? Researchers count the ways

Ever since the infamous and massive security breach at retailer Target nearly five years ago, more and more attention has focused on the potential flaws that can make payment systems vulnerable to digital attack. And now, with payments increasingly shifting to mobile platforms, it appears that the potential for hacking the mobile point-of-sale (mPOS) systems […]

Marketing

Technology in Government – Cyber threats today and tomorrow

“The internet, instead of being a social platform, is a battlefield”. It was with those words that Avi Shavit, the Strategic Adviser Cyber Security at the Israeli Innovation Authority, which is part of that government’s Ministry of Economy, kicked off his talk during the Technology in Government Cyber Security congress, held in Canberra. Shavit’s  experience […]

Marketing

A prominent place at the table for rural technological advancements

When the general public thinks about today’s exciting technological breakthroughs, the imagery that springs to mind is unlikely to be a crowded pigpen in China or yam fields in the farmland of Nigeria. Yet, rural areas are the front lines for some of the most important gains technology is enabling in modern society. The growing […]

News

Faxploit turns archaic technology into a security risk

The combined might of email, scanners, and computers should have made the venerable fax machine obsolete right? Millennials might laugh at it and presume it went the way of the floppy disk but it might shock them to know that more 300 million fax numbers still exist. That may not mean that all of those […]

News

Steeda Steve McQueen Edition Bullitt Mustang offers up to 775hp

The Ford Bullitt Mustang is already a cool car. We have driven that sweet Mustang and it already has lots of power and performance right from the factory. For those who want more performance and cool Steeda has unveiled the Steve McQueen Edition Bullitt Mustang. This special edition tacks on $20,995 for starters to the […]

News

BlackBerry KEY2 LE leak shows a Somewhat Blue color option

BlackBerry has always been a name associated with business-smart mobile devices. That is also why you’re unlikely to find a BlackBerry phone in anything but somber hues, like black, silver, or gray. There were some red editions, true, and those were pretty radical as far as BlackBerry is concerned. The upcoming KEY2 LE, a.k.a. KEY2 […]

News

Huawei Honor 8X confirms a new notch trend

The notch has become an inescapable fact of smartphone life this year but some manufacturers just refuse to live in Apple’s shadow. There’s a certain irony in how Chinese manufacturers often accused of always aping the iPhone’s designs are the very ones trying to differentiate themselves from the crowd. But not everyone wants or can […]

News

Google Play Store now lets users decide how to download apps

Smartphones are built for the Internet. Almost every functionality and every app seem to be designed with the presumption of an Internet connection always available. Naturally, installing and updating apps also require that. Internet access, however, isn’t available everywhere all the time. And in some cases, it can even be expensive. Google Play used to […]

Games

The Warehouse’s mobile app now uses AI to help ‘Snap and Shop’

The Warehouse has dipped its toes into neural networking and artificial intelligence to make it easier for customers to ‘Snap and Shop’. The new feature on its mobile app allows potential customers to use their smartphones to take pictures of items they like, and then use the app to compare those items with what’s available […]

Games

Flaw discovered in Intel chips, allows attackers to steal cloud data

Researchers have discovered another security flaw in Intel security chips – the third one this year after Spectre and Meltdown. The flaw allows an attacker to steal sensitive information stored on personal computers or third-party clouds.  According to their research report, Foreshadow has two versions, the original attack designed to extract data from Intel SGX enclaves and […]