Archive

Category Archives for "Networking"

Microsoft delays tools for third-party Cortana integrations

Microsoft has delayed the release of its tools for connecting other services to the Cortana virtual assistant, a decision that could cause it to lose ground in a crowded industry.The tech titan announced the Cortana Skills Kit in December of last year, saying at the time that it would be released to the public in February. As Microsoft watcher Brad Sams noted on Twitter, Microsoft missed that deadline, and the Skills Kit remains locked in a private beta with a select group of partners. Microsoft didn’t offer an explanation for the delay, saying in a statement that the kit will be coming soon.To read this article in full or to leave a comment, please click here

Google Play faces cat and mouse game with sneaky Android malware

What’s the best way to avoid Android malware? Downloading all your apps from the Google Play store -- where software is vetted – is perhaps the best advice.  But that doesn’t mean Google Play is perfect.Security researchers do find new Android malware lurking on Google’s official app store. That’s because hackers are coming up with sneaky ways to infiltrate the platform, despite the vetting processes that protect it."Eventually, every wall can be breached," said Daniel Padon, a researcher at mobile security provider Check Point.To be sure, most Android users will probably never encounter malware on the Google Play store. Last year, the amount of malicious software that reached the platform amounted to only 0.16 percent of all apps, according to a new report from Google.To read this article in full or to leave a comment, please click here

Google Play faces cat and mouse game with sneaky Android malware

What’s the best way to avoid Android malware? Downloading all your apps from the Google Play store -- where software is vetted – is perhaps the best advice.  But that doesn’t mean Google Play is perfect.Security researchers do find new Android malware lurking on Google’s official app store. That’s because hackers are coming up with sneaky ways to infiltrate the platform, despite the vetting processes that protect it."Eventually, every wall can be breached," said Daniel Padon, a researcher at mobile security provider Check Point.To be sure, most Android users will probably never encounter malware on the Google Play store. Last year, the amount of malicious software that reached the platform amounted to only 0.16 percent of all apps, according to a new report from Google.To read this article in full or to leave a comment, please click here

Bringing the school to kids: The importance of Internet in times of conflict

Internet access is critical to support the enjoyment of Human Rights. The most commonly referenced example is freedom of expression, but its potential goes far beyond that. Day after day, it’s demonstrating its ability to support access to all sorts of opportunities – not least to support education for all children facing emergencies and crises, another fundamental Human Right. This is what’s been discussed this week at the Mobile Learning Week.

Constance Bommelaer de Leusse

How to set up two-factor authentication for your Apple ID and iCloud account

If you aren’t using two-factor authentication to protect your Apple ID and iCloud account, you really should do it today. Hackers who claim to have millions of stolen iCloud credentials are demanding Apple pay a ransom or they’ll release them—and ZDNet obtained a sample set of credentials and determined they’re real.But guess what? Using two-factor authentication should protect you completely. It’s easy to set up, so take a minute and do it now.To read this article in full or to leave a comment, please click here

How to set up two-factor authentication for your Apple ID and iCloud account

If you aren’t using two-factor authentication to protect your Apple ID and iCloud account, you really should do it today. Hackers who claim to have millions of stolen iCloud credentials are demanding Apple pay a ransom or they’ll release them—and ZDNet obtained a sample set of credentials and determined they’re real.But guess what? Using two-factor authentication should protect you completely. It’s easy to set up, so take a minute and do it now.To read this article in full or to leave a comment, please click here

To punish Symantec, Google may distrust a third of the web’s SSL certificates

Google is considering a harsh punishment for repeated incidents in which Symantec or its certificate resellers improperly issued SSL certificates. A proposed plan is to force the company to replace all of its customers’ certificates and to stop recognizing the extended validation (EV) status of those that have it.According to a Netcraft survey from 2015, Symantec is responsible for about one in every three SSL certificates used on the web, making it the largest commercial certificate issuer in the world. As a result of acquisitions over the years the company now controls the root certificates of several formerly standalone certificate authorities including VeriSign, GeoTrust, Thawte and RapidSSL.To read this article in full or to leave a comment, please click here

To punish Symantec, Google may distrust a third of the web’s SSL certificates

Google is considering a harsh punishment for repeated incidents in which Symantec or its certificate resellers improperly issued SSL certificates. A proposed plan is to force the company to replace all of its customers’ certificates and to stop recognizing the extended validation (EV) status of those that have it.According to a Netcraft survey from 2015, Symantec is responsible for about one in every three SSL certificates used on the web, making it the largest commercial certificate issuer in the world. As a result of acquisitions over the years the company now controls the root certificates of several formerly standalone certificate authorities including VeriSign, GeoTrust, Thawte and RapidSSL.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Holding your WLAN accountable with service-level expectations

In my last post, “#WirelessSucks: Where do we go from here?” I talked about the need for better insight into the root cause of network problems. All too often, the Wi-Fi infrastructure is blamed for bad network connectivity when, in fact, the wired network (e.g. DNS, DHCP, etc.) and/or the mobile devices may be equally at fault. I identified four components that are required to accurately and easily address this problem: Monitoring networks at a service level Real-time visibility into the state of every wireless user A cloud infrastructure to store and analyze real-time state information and aggregate it to the highest level of commonality Machine learning to automate key operational tasks, such as event correlation and packet captures Let’s go into more detail on the first of these requirements: service-level monitoring and enforcement.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Holding your WLAN accountable with service-level expectations

In my last post, “#WirelessSucks: Where do we go from here?” I talked about the need for better insight into the root cause of network problems. All too often, the Wi-Fi infrastructure is blamed for bad network connectivity when, in fact, the wired network (e.g. DNS, DHCP, etc.) and/or the mobile devices may be equally at fault. I identified four components that are required to accurately and easily address this problem: Monitoring networks at a service level Real-time visibility into the state of every wireless user A cloud infrastructure to store and analyze real-time state information and aggregate it to the highest level of commonality Machine learning to automate key operational tasks, such as event correlation and packet captures Let’s go into more detail on the first of these requirements: service-level monitoring and enforcement.To read this article in full or to leave a comment, please click here

62% off Anker PowerLine+ Micro USB 6ft Premium Cable – Deal Alert

With this cable, Anker boasts reinforced stress points with a 10000+ bend lifespan, double-braided nylon exterior and toughened aramid fiber core, laser-welded connectors and a worry-free 18-month warranty. The micro-USB cord is a generous 6 feet in length. Its list price on Amazon is currently discounted to just $10.99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Moto G5 Plus underscores why the iPhone 8 needs AR

Hands-on testing of Motorola's Moto G5 Plus drives home the point that Apple’s next-generation iPhone better have augmented reality (AR) to retain loyal customers willing to pay three times the cost of the G5 Plus.The next iPhone has to do something significantly different to maintain its premium brand position. AR and perhaps virtual reality (VR) are the only two features on the horizon that will meaningfully differentiate the iPhone 8 from the Moto G5 Plus.Moto G5 Plus features Sometimes smartphone reviews read like an oenophile waxing on about the subtleties of a fine wine. This review will not because the Moto G5 Plus designers deliver on four characteristics consumers want.To read this article in full or to leave a comment, please click here