According to Counterpoint Research, Samsung was the global leader in both mobile phone and smartphone shipments during the second quarter. In smartphones, Samsung accounted for 21% of units shipped from April through June, followed by the 14% belonging to Apple. Huawei was third with a 9% market share. Xiaomi (5%)…
Judge Koh wants second Apple-Samsung damages retrial to be short and sweet
Judge Lucy Koh will be presiding over the second Apple-Samsung damages retrial, which will be heard in March or April of 2016. After a three judge panel turned down Samsung’s request for a new hearing on the first patent trial. Samsung requested that the entire panel of judges rule on…
Rumor: LG’s has a second Nuclun chip; it’s faster than the Exynos 7420 SoC, specs and benchmarks show
Aiming to get to the level of Samsung, Apple, and Huawei, LG has also been making its baby steps on the chipset scene, aiming to design its own smartphone chipset. Its NUCLUN chip barely made it outside South Korea as it was allegedly overheating; subsequently, rumors about another LG-made chipset…
6 notorious hackers and their second careers
Source: National Cyber Security – Produced By Gregory Evans The traditional hacker of yore, commonly thought of as a pimply adolescent with Cheetos-colored fingers, is all grown up now. But in the Clinton-era glory days, the hacker was seen as a technological terror, plying a trade few understood. Most of…
April 16 – 18, 2015-The Second International Conference on Artificial Intelligence and Pattern Recognition (AIPR2015)
Source: National Cyber Security – Produced By Gregory Evans Powered by Max Banner Ads You are invited to participate in The Second International Conference on Artificial Intelligence and Pattern Recognition that will be held at Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences (SIAT – CAS), Shenzhen, China on April 16-18,…
Second hacking crew joins Syrian Electronic Army on Team Assad
Source: National Cyber Security – Produced By Gregory Evans A second hacking crew has weighed into the conflict in Syria on the side of embattled Syrian president Bashar al-Assad. Net security firm FireEye reckons it has identified 11 members of the “Syrian Malware Team” after analysing a strain of […]…
FBI — Botnets Infecting 18 Computers per Second. But How Many of Them NSA Holds?
Botnets – a secretly compromised networks of ordinary home and office computers with rogue software or “malware” that are controlled by an individual criminal or a group – has dramatically increased over the past several years and are considered to pose the biggest threat to the Internet. Cyber criminals have…
Offshore wind specialist Innovatum purchases second Saab Seaeye Cougar XT for North Sea Fleet
Top Priority Sector: infrastructure_protection Saab Seaeye has announced that Innovatum, LTD has purchased a second Cougar XT Compact ROV for its North Sea fleet of compact and rapidly mobilized packages for the location, tracking and survey of inshore and coastal pipelines and cables. Read More…. For more information go to…
Find the Security Holes with 60 Second Security
A 60-second security video tells us that when one security hole closes, another one pops up. How many years a security hole stayed in Linux Kernel? How many security patches did Windows XP receive? How many lock screen holes have been detected in iOS? How much do the Google Glasses…