Archive

Category Archives for "Networking"

How to make Fully Homomorphic Encryption “practical and usable”

Fully Homomorphic Encryption (FHE) for years has been a promising approach to protecting data while it’s being computed on, but making it fast enough and easy enough to use has been a challenge.The Intelligence Advanced Research Projects Activity, which has been leading the Department of Defense’s examination of this topic, recently awarded research and development firm Galois a $1M contract to explore ways to bring FHE to programmers. The goal, says Galois Principal Investigator Dr. David Archer, is making FHE “practical and usable,” and his outfit is working with researchers at the New Jersey Institute of Technology on this front via the Rapid Machine-learning Processing Applications and Reconfigurable Targeting of Security (RAMPARTS) initiative. To read this article in full or to leave a comment, please click here

57% off Anker PowerCore Fusion 5000 2-in-1 Portable Charger and Wall Charger – Deal Alert

Charge your device and PowerCore Fusion's internal battery via a wall outlet, then take it with you for up to 3 phone charges -- any place, any time. In the wall or on-the-go, Anker's exclusive PowerIQ and VoltageBoost technologies ensure that all devices receive their fastest possible charge. Also features a foldable plug to ensure maximum portability. At the moment, its list proce of $50.99 is reduced 57% on Amazon to just $21.99. See the discounted Anker PowerCore 5000 on Amazon.To read this article in full or to leave a comment, please click here

8 ways to manage an internet or security crisis

Your business is hit with a ransomware attack. Or your ecommerce site crashes. Your legacy system stops working. Or maybe your latest software release has a major bug. These are just some of the problems that ecommerce, technology and other companies experience at one time or another.The issue is not if a problem – or crisis – occurs, but how your company handles it when it does. Manage the problem poorly, you risk losing customers, or worse. Handle a crisis promptly and professionally, you can fend off a public relations disaster and might even gain new customers.So what steps can businesses take to mitigate and effectively manage an IT-related crisis? Here are eight suggestions.To read this article in full or to leave a comment, please click here

8 ways to manage an internet or security crisis

Your business is hit with a ransomware attack. Or your ecommerce site crashes. Your legacy system stops working. Or maybe your latest software release has a major bug. These are just some of the problems that ecommerce, technology and other companies experience at one time or another.The issue is not if a problem – or crisis – occurs, but how your company handles it when it does. Manage the problem poorly, you risk losing customers, or worse. Handle a crisis promptly and professionally, you can fend off a public relations disaster and might even gain new customers.So what steps can businesses take to mitigate and effectively manage an IT-related crisis? Here are eight suggestions.To read this article in full or to leave a comment, please click here

8 ways to manage an internet or security crisis

Your business is hit with a ransomware attack. Or your ecommerce site crashes. Your legacy system stops working. Or maybe your latest software release has a major bug. These are just some of the problems that ecommerce, technology and other companies experience at one time or another.The issue is not if a problem – or crisis – occurs, but how your company handles it when it does. Manage the problem poorly, you risk losing customers, or worse. Handle a crisis promptly and professionally, you can fend off a public relations disaster and might even gain new customers.So what steps can businesses take to mitigate and effectively manage an IT-related crisis? Here are eight suggestions.To read this article in full or to leave a comment, please click here

WannaCry attacks are only the beginning

Thousands of organizations from around the world were caught off guard by the WannaCry ransomware attack launched Friday. As this rapidly spreading threat evolves, more cybercriminals are likely to attempt to profit from this and similar vulnerabilities.As a ransomware program, WannaCry itself is not that special or sophisticated. In fact, an earlier version of the program was distributed in March and April and, judging by its implementation, its creators are not very skilled.To read this article in full or to leave a comment, please click here

WannaCry attacks are only the beginning

Thousands of organizations from around the world were caught off guard by the WannaCry ransomware attack launched Friday. As this rapidly spreading threat evolves, more cybercriminals are likely to attempt to profit from this and similar vulnerabilities.As a ransomware program, WannaCry itself is not that special or sophisticated. In fact, an earlier version of the program was distributed in March and April and, judging by its implementation, its creators are not very skilled.To read this article in full or to leave a comment, please click here

What to do about WannaCry if you’re infected or if you’re not

Today is likely to be painful for many organizations all over the world that took the weekend off and are returning to the work-week to find hundreds or thousands of computers on their networks encrypted by WannaCry ransomware, which surfaced Friday and has been propagating ever since.Estimates by law enforcement agency Europol estimated yesterday that more than 200,000 computers in 150 countries were infected, but with the worm continuing to spread to vulnerable Windows machines, that number will surely rise.For those whose machines have not been infected, here’s what you need to do right away: Apply the Microsoft patch that will thwart the attack. It’s available here. If you can’t do that because you haven’t tested whether the patch will affect your software build, disable Server Message Block 1 (SMB1) network file sharing. That’s where the flaw is that it attacks. Consider closing firewall port 139, 445 or both because these are the ports SMB uses. Longer term, to guard against similar future attacks you should:To read this article in full or to leave a comment, please click here

What to do about WannaCry if you’re infected or if you’re not

Today is likely to be painful for many organizations all over the world that took the weekend off and are returning to the work-week to find hundreds or thousands of computers on their networks encrypted by WannaCry ransomware, which surfaced Friday and has been propagating ever since.Estimates by law enforcement agency Europol estimated yesterday that more than 200,000 computers in 150 countries were infected, but with the worm continuing to spread to vulnerable Windows machines, that number will surely rise.For those whose machines have not been infected, here’s what you need to do right away: Apply the Microsoft patch that will thwart the attack. It’s available here. If you can’t do that because you haven’t tested whether the patch will affect your software build, disable Server Message Block 1 (SMB1) network file sharing. That’s where the flaw is that it attacks. Consider closing firewall port 139, 445 or both because these are the ports SMB uses. Longer term, to guard against similar future attacks you should:To read this article in full or to leave a comment, please click here

Samsung to detail new Tizen OS for smart home appliances, IoT devices

In the future, your Samsung vacuum cleaner, robot or washing machine will run on an OS called Tizen RT, slated to be introduced and detailed on Tuesday.The OS for smart devices and gadgets -- in other words, internet of things (IoT) devices -- will be introduced by Samsung at its Tizen Developers Conference, which will be held in San Francisco starting Tuesday.Samsung will share the architecture and future release schedule for Tizen RT at the conference. A number of sessions are being held on how to deploy and update the OS across devices.The real-time OS is a slimmed-down version of the mainstream Tizen OS, which is being used in Samsung TVs, smartphones, Gear smartwatches and other devices. Though it is an open-source OS, Samsung is its biggest backer.To read this article in full or to leave a comment, please click here

IDG Contributor Network: BackupAssist takes a step back in time with a SME backup tool

I live my life in two worlds. The most visible world, at least to this audience, involves spending lots of time in Silicon Valley and the U.S. generally and conversing with the technology illuminati—those who “get” technology, the cloud and what it can offer the world.In my other life, I live in a small (like, tiny) rural village in deepest, darkest New Zealand. I’m surrounded by fine folk, the so-called “salt of the earth” who make a living from the land, sheep, grapes and the rural sector generally. To these folks, technology is simply another tool to add to the arsenal of tools they have at their disposal.+ Also on Network World: Deep dive on AWS vs. Azure vs. Google cloud storage options + For these people, cloud isn’t always an already-adopted opportunity. Rather they use a variety of technology products and services. I have a friend who runs an agricultural service business whose operational software is a DOS-based solution. While this may have friends in the technology world rolling their eyes and shaking their heads, it is the reality of the “real world.” As an aside, I’ve said for the longest time that technology companies Continue reading

It’s Up To Each Of Us: Why I WannaCry For Collaboration

WannaCry, or WannaCrypt, is one of the many names of the piece of ransomware that impacted the Internet last week, and will likely continue to make the rounds this week.

There are a number of takeaways and lessons to learn from the far-reaching attack that we witnessed. Let me tie those to voluntary cooperation and collaboration which together represent the foundation for the Internet’s development. The reason for making this connection is because they provide the way to get the global cyber threat under control. Not just to keep ourselves and our vital systems and services protected, but to reverse the erosion of trust in the Internet.

Mr. Olaf Kolkman

Will Windows 10-on-ARM PCs support Mixed Reality headsets?

A Windows-on-ARM PC is getting closer to reality. Microsoft showed off a prototype mini-desktop with an ARM processor running Windows 10 at last week's Build conference, with the PC running applications like Office.The PC was shown in a video posted on the Channel 9 website. The presenters reinforced Microsoft's previous message saying that all x86 applications will work on Windows-on-ARM PCs.Microsoft has maintained that the experience on Windows 10-on-ARM PCs will be similar to x86 laptops, but many questions remain. One revolves around whether Windows 10-on-ARM PCs will support Windows Mixed Reality headsets.To read this article in full or to leave a comment, please click here