je.st
news
Tag: devices
Fujitsu Offers FENICS II Business Wi-Fi Service To Promote Business Use Of Smart Devices
2014-08-05 08:28:54| rfglobalnet News Articles
Fujitsu announces the launch of FUJITSU Managed Infrastructure Service FENICS II Business Wi-Fi Service, which makes it easy for companies to deploy and operate a wireless LAN environment and to use the cloud. The new service will be available from today, in Japan only.
Tags: service
business
offers
promote
Fujitsu Offers FENICS II Business Wi-Fi Service To Promote Business Use Of Smart Devices
2014-08-05 08:28:54| wirelessdesignonline News Articles
Fujitsu announces the launch of FUJITSU Managed Infrastructure Service FENICS II Business Wi-Fi Service, which makes it easy for companies to deploy and operate a wireless LAN environment and to use the cloud. The new service will be available from today, in Japan only.
Tags: service
business
offers
promote
Android vulnerability still a threat to many devices nearly two years later
2014-08-02 02:22:26| Wireless - Topix.net
Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery, according to security firm Bromium.
Tiny UWB Modules To Enable Accurate Location Awareness For More Secure Connected Devices
2014-08-01 08:52:54| rfglobalnet Home Page
The ALBIREO project was launched this month by CSEM along with SMEs 3db Access and Insight SiP. They are joining forces to develop miniaturized ultra-wideband (UWB) technologies for enabling precise positioning between connected devices. Location awareness offers enhanced security for applications such as building access and mobile payments.
Tags: location
secure
accurate
enable
Android vulnerability allows malware to compromise most devices and apps
2014-07-29 17:04:21| InfoWorld: Top News
The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device. The core problem is that Android fails to validate public key infrastructure certificate chains for app digital signatures, said Jeff Forristal, chief technology officer of Bluebox Security, a San Francisco company whose researchers discovered the issue.
Tags: devices
apps
compromise
vulnerability
Sites : [230] [231] [232] [233] [234] [235] [236] [237] [238] [239] [240] [241] [242] [243] [244] [245] [246] [247] [248] [249] next »