This innovative Tracer360 visibility vest averages 5 out of 5 stars on Amazon from over 325 customers (90% rate a perfect 5 stars -- read reviews). It is designed for maximum comfort and visibility year-round while cycling, running, walking, on a motorcycle or any other application where visibility is a concern, particularly at night. It features a full 360 degrees of illumination and 3M reflectivity, designed to catch the attention of the most distracted drivers up to 1/4 mile away. It flashes, strobes or blinks and features a variety of colors, fully selectable/adjustable even while running. Lightweight and breathable, this vest won't trap moisture and can be worn year-round over a jacket just as easily as a t-shirt. Its list price of $69.99 has been reduced by 26% to $51.50. See the highly rated and discounted Tracer360 illumination vest on Amazon.To read this article in full or to leave a comment, please click here
Allowing algorithms to curate our lives might have unintended consequences, an Australian researcher says.Algorithms are used throughout our interaction with technology. They range from those used by Facebook to tell us which friends we find most interesting, to Google’s Now product that reminds us of meetings we may care so little about that we’ve forgotten about them. The pictures we see in social media photo streams are dictated by algorithms, as are search results and the music we listen to on online radio stations.+ Also on Network World: 10 amazing algorithms +To read this article in full or to leave a comment, please click here
When a computer connects to a public Wi-Fi network or an untrusted LAN, a malicious actor could potentially compromise a browser’s HTTPS connection and eavesdrop on URLs such as Dropbox, Google Drive URLs or Password reset URLs.The fix is easy for a consumer: un-checking the automatic detect setting. But an enterprise user might need to ask the IT department to eliminate this risk. Windows, Mac and Linux computers are all at risk.Windows: How to reduce the risk of URL hijack To prevent this HTTPS URL hijack on a Windows computer, open the Control Panel and select Internet Properties. Then select the Connections Tab, and in it the LAN settings button. Un-check Automatically detect settings.To read this article in full or to leave a comment, please click here
The C930e webcam from Logitech is business-grade, making a professional impression with full 1080p HD video at a smooth 30 frames per second. It's the first with H.264 UVC 1.5 encoding, which processes video on-camera and takes the burden off your PC. The C930e features full pan, tilt and 4X digital zoom capability. It has a wide 90-degree extended view, making it ideal for meeting rooms, whiteboard presentations, product demos, and more. Smooth autofocus keeps your video image razor sharp, even in close ups. And RightLight 2 technology automatically adjusts for low light or backlit situations so you’re always seen in just the right light. When not in use, a privacy screen easily conceals the lens for added security. Several mounting options are available. This webcam averages 4.5 out of 5 stars from 550 customers (read reviews). Its list price of $129.99 has been reduced 22% to $101.79, making it a reasonable option for all of your conference rooms. See the discounted item now on Amazon.To read this article in full or to leave a comment, please click here
A common remark from me is frustration about the huge number of companies competing in the enterprise file sharing and synchronization (EFSS) space. Honestly, the number of companies that send pitches to me on a weekly basis claiming to be highly differentiated from all the others is frustrating.It must be all the more frustrating for enterprise organizations that need to chose an EFSS vendor. With so many in the market, it is a confusing and bewildering decision to make, which is, after all, why analyst firms exist. While Gartner, Forrester, IDC and their ilk receive much criticism around suggestions that they are both behind the times and commercially conflicted, the fact is they bring a degree of robustness to technology assessments.To read this article in full or to leave a comment, please click here
USB keys were famously used as part of the Stuxnet attack on the Iranian nuclear program and for good reason: it’s got a high rate of effectiveness, according to a researcher at Black Hat 2016.Of 297 keys spread around the University of Illinois Urbana Champaign 45% were not only plugged into victims’ computers but the victims then clicked on links in files that connected them to more malware, says Elie Burstzein, a Google researcher who presented the results.+More on Network World: Black Hat: 9 free security tools for defense & attacking | Follow all the stories from Black Hat 2016 +To read this article in full or to leave a comment, please click here
We’ve been told that EMV (Europay, MasterCard and Visa) chip-equipped cards have an added layer of security, making them more secure and harder to clone than cards with only a magnetic stripe. But Rapid7 security research manager Tod Beardsley said, “The state of chip and pin security is that it’s a little oversold.”Black Hat USA attendees who watched an ATM spit out hundreds of dollars might tend to agree. The demonstration was part of Hacking Next-Gen ATMs: From Capture to Cashout which was presented by Rapid7’s Weston Hecker. The abstract of his talk said the system he devised could “cash out around $20,000/$50,000 in 15 minutes.”To read this article in full or to leave a comment, please click here
The Executive Office Solutions Portable Adjustable Laptop Desk/Stand/Table is designed to allow you to set up an office anywhere! It is easy to carry, with a light weight aluminum frame. This device makes a perfect desk for your laptop. The adjustable legs allow you to rotate 360 degrees and lock it in place at various angles. This desk is also vented and connects to your computer via the included USB cord to power two quiet CPU cooling fans.To read this article in full or to leave a comment, please click here
We are in the midst of a dramatic shift in the way we work. In the new gig economy, some 40 percent of the American workforce consists of contingent workers: contract workers, part-time workers, independent contractors and those who freelance.The U.S. government doesn’t currently collect much data on the many American contingent workers, which means it can’t keep up with their needs. Recognizing this, the Department of Labor is introducing the Contingent Worker Supplement in its next population survey in 2017.To read this article in full or to leave a comment, please click here
Industrial facilities should be on guard against drones. Even off-the-shelf versions of the unmanned aircraft could be used to disrupt sensitive systems.
On Wednesday, Jeff Melrose, a presenter at Black Hat 2016, showed how consumer drones could do more than just conduct aerial spying. The flying machines can also carry a transmitter to hack into a wireless keyboard or interfere with industrial controls, he said.
It’s not enough to place a fence around a building to keep intruders out, according to Melrose, who is a principal tech specialist at Yokogawa, an industrial controls provider. These days, some consumer drones can travel up to 3 miles (4.8 kilometers) or more.To read this article in full or to leave a comment, please click here
Banner Health, a provider of hospital services, has notified by mail 3.7 million people -- including patients, health plan members, healthcare providers and customers at its food and beverage outlets -- that their payment card and health plan data, among other information, may have been compromised.The provider said Wednesday that it discovered on July 7 that cyberattackers may have gained access to computers that process payment card data at the food and beverage outlets at some of its locations. Payment cards that were used at these outlets at certain Banner Health locations from June 23 to July 7 this year may have been affected, the provider said. Card payments for medical services were not affected, according to the investigation.To read this article in full or to leave a comment, please click here
This gadget from Inateck will duplicate any 2.5 inch or 3.5 inch SATA HDD/SSD drive quickly and automatically without the need for a computer, by just pushing a button. Once cloning has started, an LED indicator shows you 25%, 50%, 75%, and 100% completion status. Or don't kick off the cloning process, and the unit allows you to move files freely between drives as you would an external HDD/SSD. Built-in safeguards protect against overheating, overvoltage, current leaks, short circuits, peak voltage, and other disturbances to ensure safe data access and transfers. The unit currently averages 4.5 out of 5 stars on Amazon from over 720 customers (read reviews). With a typical list price of $79.99, this 53% off deal puts it at just $37.99. See the discounted Inateck HDD/SSD cloning station now on Amazon.To read this article in full or to leave a comment, please click here
IBM scientists have created artificial neurons and synapses using phase change memory (PCM) that mimics the brain's cognitive learning capability.
It is the first time the researchers were able to create what they described as "randomly spiking neurons" using phase-change materials to store and process data. The discovery is a milestone in developing energy-sipping and highly dense neuro networks that could be used for cognitive computing applications.
In short, the technology can be used to improve today's processors in order to perform computations in applications such as data-correlation detection for the Internet of Things (IoT), stock market trades and social media posts at a staggeringly fast rate.To read this article in full or to leave a comment, please click here
More no-code and low-code development toolsThe debates over mobile web, native code, and hybrid mobile apps may never end, but one thing everyone can agree on is that we can’t build mobile apps fast enough. Low-code development platforms take a visual, drag-and-drop approach to building apps, allowing developers to deliver applications faster at lower costs. So-called no-code tools even promise to put app building within reach of nondevelopers.To read this article in full or to leave a comment, please click here
The U.S. government is spending more than $81 billion on information technology. But only about 24% is spent overall on new systems, with the rest being used to maintain old systems.The Social Security Administration, for instance, has more than 60 million lines of Cobol, the agency’s Office of Inspector General reported last month.And the U.S. Defense Department is running some nuclear weapons support systems on an IBM Series/1 Computer, circa 1970s, the U.S. Government Accountability Office recently reported.MORE ON NETWORK WORLD: 26 crazy and scary things the TSA has found on travelers
“Legacy IT investments across the federal government are becoming increasingly obsolete,” wrote the GAO in its report released in May. “Specifically, many use outdated languages and old parts.”To read this article in full or to leave a comment, please click here
Putting Chromebooks to workImage by Hiroshi LockheimerThe Google Play Store is coming to a Chromebook near you. But for this to really make a major difference in how we use Chrome OS, it’s going to take the right apps.To read this article in full or to leave a comment, please click here
The great DNC email caperImage by REUTERS/Mark KauzlarichThe tech news cycle dovetailed with the political news cycle last week when first emails and then voice mails from the Democratic National Committee were released via WikiLeaks. And with the possibility of Russian involvement, the incident went from a domestic squabble to a potentially international incident.To read this article in full or to leave a comment, please click here
For most business users, there’s one common device we all use that is still a common attack vector for hackers. We carry them with us everywhere, and we store most of our important files on the local drive, even if it’s just temporary. A laptop has more storage, more connection options, and more legacy apps than any smartphone or tablet.For any business, it’s important to take laptop security seriously, even if you already have an endpoint security product in place and teach enterprise users about best practices. Hackers are industrious; they develop new techniques and know that one of the easiest ways to steal passwords, break into file archives, and intercept a confidential email is through a laptop.To read this article in full or to leave a comment, please click here
Insurance companies typically have decades of data, if not more, on which to base their risk estimates.That's not the case with cyber risk, however. There's very little historical data available, the data is not complete, and the threat landscape doesn't just change year by year, but day by day. There isn't even a standard set of definitions that everyone can agree on.That's starting to change, as insurers expand their services so that they can better educate their customers about cyber risk and even help them defend against attacks before they happen and deal with the fallout of when a breach does occur.I say potahto
One of the first problems when it comes to buying cyberinsurance is that nobody knows exactly what it means. Corporate financial officers, security managers, and insurance brokers have different understanding of risk, for example.To read this article in full or to leave a comment, please click here