Archive

Category Archives for "Networking"

58% off Alinshi Foldable Soft Silicone USB Waterproof Keyboard – Deal Alert

This keyboard from Alinshi is flexible, soft, silent, waterproof, dustproof, lightweight, roll-up-able, portable and easy to store. If you're looking for a travel keyboard you can take with you and won't have to worry too much about, this one might fit the bill, especially when you consider it's been discounted 58% to just $13. See the discounted keyboard on Amazon.To read this article in full or to leave a comment, please click here

Controversial LTE-U tech OK’d by FCC

The Federal Communications Commission announced Wednesday that it had approved two cellular base stations – one each from Ericsson and Nokia – to use LTE-U, marking the first official government thumbs-up for the controversial technology.FCC chairman Ajit Pai said in a statement that the unlicensed spectrum – historically, the territory of Wi-Fi – can now be used to help ease the load on carrier mobile networks.To read this article in full or to leave a comment, please click here

7.4% of software on PCs are past end of life

A new Secunia Research report states that the average private user in the U.S. has 75 programs installed on their PC, and 7.4% of them are past end of life and no longer patched by the vendor.   By being past end of life, this software becomes a popular attack target by hackers because the programs are so widespread on devices today. This was the warning from Microsoft when it ended support for Windows XP in 2014—that people should no longer use it because exploits would no longer be fixed.  The report from Secunia Research, which is owned by Flexera Software, covers findings for the fourth quarter of 2016 in 12 countries. In the U.S., it found 7.5 percent of private users had unpatched Windows operating systems in Q4 of 2016, up from 6.1 percent in Q3 of 2016 and down from 9.9 percent in Q4 of 2015.To read this article in full or to leave a comment, please click here

7.4% of software on PCs are past end of life

A new Secunia Research report states that the average private user in the U.S. has 75 programs installed on their PC, and 7.4% of them are past end of life and no longer patched by the vendor.   By being past end of life, this software becomes a popular attack target by hackers because the programs are so widespread on devices today. This was the warning from Microsoft when it ended support for Windows XP in 2014—that people should no longer use it because exploits would no longer be fixed.  The report from Secunia Research, which is owned by Flexera Software, covers findings for the fourth quarter of 2016 in 12 countries. In the U.S., it found 7.5 percent of private users had unpatched Windows operating systems in Q4 of 2016, up from 6.1 percent in Q3 of 2016 and down from 9.9 percent in Q4 of 2015.To read this article in full or to leave a comment, please click here

Verizon plans 5G wireless trial service in 11 cities this year

Lab tests of pre-standard 5G wireless with multi-gigabit speeds are evolving into trial services that users can actually enjoy in the real world – though not necessarily while walking around with a smartphone.Verizon said Wednesday it will launch pre-commercial 5G service in 11 markets around the U.S. by the middle of this year, joining rival AT&T in aggressively deploying the future technology.MORE: 2016 -- the year 5G wireless trials really took offAt Mobile World Congress in Barcelona next week, carriers are expected to announce more upcoming 5G trials.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Reaching the cybersecurity tipping point

Remember that moment when you really committed yourself to solid security and privacy practices? The moment when you committed to never clicking on a link you weren’t sure about, to always checking for badges on people coming in the door, to always using your password manager to create a complex password? If you do, you reached your “cybersecurity tipping point.”For many, that moment has not yet come. And if you are reading this article, it might be your job to get your employees to hit that point. And you already know that the hard part is figuring out how.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Reaching the cybersecurity tipping point

Remember that moment when you really committed yourself to solid security and privacy practices? The moment when you committed to never clicking on a link you weren’t sure about, to always checking for badges on people coming in the door, to always using your password manager to create a complex password? If you do, you reached your “cybersecurity tipping point.”For many, that moment has not yet come. And if you are reading this article, it might be your job to get your employees to hit that point. And you already know that the hard part is figuring out how.To read this article in full or to leave a comment, please click here

What to expect from the Trump administration on cybersecurity

Look for U.S. President Donald Trump's administration to push for increased cybersecurity spending in government, but also for increased digital surveillance and encryption workarounds.That's the view of some cybersecurity policy experts, who said they expect Trump to focus on improving U.S. agencies' cybersecurity while shying away from new cybersecurity regulations for businesses. Trump is likely to look for ways for the National Security Agency and other agencies to assist the government and companies defend against cyberattacks, said Jeffrey Eisenach, a visiting scholar at the American Enterprise Institute and a tech advisor during Trump's presidential transition.To read this article in full or to leave a comment, please click here

What to expect from the Trump administration on cybersecurity

Look for U.S. President Donald Trump's administration to push for increased cybersecurity spending in government, but also for increased digital surveillance and encryption workarounds.That's the view of some cybersecurity policy experts, who said they expect Trump to focus on improving U.S. agencies' cybersecurity while shying away from new cybersecurity regulations for businesses. Trump is likely to look for ways for the National Security Agency and other agencies to assist the government and companies defend against cyberattacks, said Jeffrey Eisenach, a visiting scholar at the American Enterprise Institute and a tech advisor during Trump's presidential transition.To read this article in full or to leave a comment, please click here

New macOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay.Crypto ransomware programs for macOS are rare. This is the second such threat found in the wild so far, and it's a poorly designed one. The program was named OSX/Filecoder.E by the malware researchers from antivirus vendor ESET who found it.OSX/Filecoder.E masquerades as a cracking tool for commercial software like Adobe Premiere Pro CC and Microsoft Office for Mac and is being distributed as a bittorrent download. It is written in Apple's Swift programming language by what appears to be an inexperienced developer, judging from the many mistakes made in its implementation.To read this article in full or to leave a comment, please click here

New macOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay.Crypto ransomware programs for macOS are rare. This is the second such threat found in the wild so far, and it's a poorly designed one. The program was named OSX/Filecoder.E by the malware researchers from antivirus vendor ESET who found it.OSX/Filecoder.E masquerades as a cracking tool for commercial software like Adobe Premiere Pro CC and Microsoft Office for Mac and is being distributed as a bittorrent download. It is written in Apple's Swift programming language by what appears to be an inexperienced developer, judging from the many mistakes made in its implementation.To read this article in full or to leave a comment, please click here

Hybrid ERP matures as companies develop better strategies

It’s hard to find a company that does not have some form of a hybrid (cloud and on-premise) ERP system. For most, that happened by accident. Someone in the organization bypassed IT and bought a cloud service to fill a need more quickly than they could with an on-premise solution. Salesforce.com, for example, has often been the start of a company’s march to a hybrid environment.Cloud applications can be relatively easy, low-cost solutions, but they do introduce new complexities when they need to be integrated with on-premise ERP systems and databases, or with each other. Ensuring that cloud and on-premise systems play nice together is just one part of the hybrid challenge. Making the right decisions about what will be in the cloud and what stays in-house is the other.To read this article in full or to leave a comment, please click here

Hybrid ERP matures as companies develop better strategies

It’s hard to find a company that does not have some form of a hybrid (cloud and on-premise) ERP system. For most, that happened by accident. Someone in the organization bypassed IT and bought a cloud service to fill a need more quickly than they could with an on-premise solution. Salesforce.com, for example, has often been the start of a company’s march to a hybrid environment.Cloud applications can be relatively easy, low-cost solutions, but they do introduce new complexities when they need to be integrated with on-premise ERP systems and databases, or with each other. Ensuring that cloud and on-premise systems play nice together is just one part of the hybrid challenge. Making the right decisions about what will be in the cloud and what stays in-house is the other.To read this article in full or to leave a comment, please click here

How the DOT discovered its network was compromised by shadow IT

When Richard McKinney set out to migrate the Department of Transportation (DOT) to Microsoft Office 365, he got a valuable lesson in shadow IT, one that could serve as a cautionary tale for other government leaders as they look to upgrade and consolidate their systems.McKinney, who only recently stepped down as CIO at DOT, had been leading a turnaround mission at the department since his arrival, but when it came time for the Office 365 rollout, he quickly discovered how chaotic the situation was, with hundreds of unauthorized devices running undetected on the sprawling network.To read this article in full or to leave a comment, please click here

How the DOT discovered its network was compromised by shadow IT

When Richard McKinney set out to migrate the Department of Transportation (DOT) to Microsoft Office 365, he got a valuable lesson in shadow IT, one that could serve as a cautionary tale for other government leaders as they look to upgrade and consolidate their systems.McKinney, who only recently stepped down as CIO at DOT, had been leading a turnaround mission at the department since his arrival, but when it came time for the Office 365 rollout, he quickly discovered how chaotic the situation was, with hundreds of unauthorized devices running undetected on the sprawling network.To read this article in full or to leave a comment, please click here

How the DOT discovered its network was compromised by shadow IT

When Richard McKinney set out to migrate the Department of Transportation (DOT) to Microsoft Office 365, he got a valuable lesson in shadow IT, one that could serve as a cautionary tale for other government leaders as they look to upgrade and consolidate their systems.McKinney, who only recently stepped down as CIO at DOT, had been leading a turnaround mission at the department since his arrival, but when it came time for the Office 365 rollout, he quickly discovered how chaotic the situation was, with hundreds of unauthorized devices running undetected on the sprawling network.To read this article in full or to leave a comment, please click here