Home devices
 

Keywords :   


Tag: devices

Fujitsu Offers FENICS II Business Wi-Fi Service To Promote Business Use Of Smart Devices

2014-08-05 08:28:54| rfglobalnet News Articles

Fujitsu announces the launch of FUJITSU Managed Infrastructure Service FENICS II Business Wi-Fi Service, which makes it easy for companies to deploy and operate a wireless LAN environment and to use the cloud. The new service will be available from today, in Japan only.

Tags: service business offers promote

 

Fujitsu Offers FENICS II Business Wi-Fi Service To Promote Business Use Of Smart Devices

2014-08-05 08:28:54| wirelessdesignonline News Articles

Fujitsu announces the launch of FUJITSU Managed Infrastructure Service FENICS II Business Wi-Fi Service, which makes it easy for companies to deploy and operate a wireless LAN environment and to use the cloud. The new service will be available from today, in Japan only.

Tags: service business offers promote

 
 

Android vulnerability still a threat to many devices nearly two years later

2014-08-02 02:22:26| Wireless - Topix.net

Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery, according to security firm Bromium.

Tags: two years later devices

 

Tiny UWB Modules To Enable Accurate Location Awareness For More Secure Connected Devices

2014-08-01 08:52:54| rfglobalnet Home Page

The ALBIREO project was launched this month by CSEM along with SMEs 3db Access and Insight SiP. They are joining forces to develop miniaturized ultra-wideband (UWB) technologies for enabling precise positioning between connected devices. Location awareness offers enhanced security for applications such as building access and mobile payments.

Tags: location secure accurate enable

 

Android vulnerability allows malware to compromise most devices and apps

2014-07-29 17:04:21| InfoWorld: Top News

The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device. The core problem is that Android fails to validate public key infrastructure certificate chains for app digital signatures, said Jeff Forristal, chief technology officer of Bluebox Security, a San Francisco company whose researchers discovered the issue.

Tags: devices apps compromise vulnerability

 

Sites : [230] [231] [232] [233] [234] [235] [236] [237] [238] [239] [240] [241] [242] [243] [244] [245] [246] [247] [248] [249] next »