Archive

Category Archives for "Networking"

Terrorists are winning the digital arms race, experts say

Terrorist groups are embracing a huge number of digital tools to recruit members and plan attacks, putting them a step ahead of governments trying to combat them, a group of counterterrorism experts said.Twitter removed about 250,000 accounts connected with ISIS in one year, but the terrorist group uses 90 other social media platforms, Rob Wainwright, the director of Europol said Tuesday. Terrorist groups have begun to live stream their attacks, and they are using the internet to launch "innovative crowdfunding" campaigns, he said at the World Economic Forum in Davos-Klosters, Switzerland."The technology is advanced," Wainwright added. "They know what to do, and they know how to use it."To read this article in full or to leave a comment, please click here

Terrorists are winning the digital arms race, experts say

Terrorist groups are embracing a huge number of digital tools to recruit members and plan attacks, putting them a step ahead of governments trying to combat them, a group of counterterrorism experts said.Twitter removed about 250,000 accounts connected with ISIS in one year, but the terrorist group uses 90 other social media platforms, Rob Wainwright, the director of Europol said Tuesday. Terrorist groups have begun to live stream their attacks, and they are using the internet to launch "innovative crowdfunding" campaigns, he said at the World Economic Forum in Davos-Klosters, Switzerland."The technology is advanced," Wainwright added. "They know what to do, and they know how to use it."To read this article in full or to leave a comment, please click here

Endpoint Security in 2017

Just a few years ago, there were about 6 to 10 well regarded AV vendors that dominated the market.  Fast forward to 2017 and my colleague Doug Cahill and I are currently tracking around 50 endpoint security vendors. Why has this market changed so much in such a short timeframe?  New types of targeted threats regularly circumvented signature-based AV software over the past few years.  This weakness led to system compromises, data breaches, and panicky CISOs in search of AV alternatives.  This in turn persuaded the fat cats on Sand Hill Rd. to throw VC dollars at anything that hinted at endpoint security innovation.Okay, I get the need for more than signature-based AV but there simply isn’t room in the market for 50 endpoint security vendors.  Thus, it’s safe to assume a lot of M&A activity and outright business failures this year. To read this article in full or to leave a comment, please click here

43% off TP-Link Smart LED Wi-Fi Light Bulb, Dimmable and Alexa Compatible – Deal Alert

TP-Link has discounted its 50W smart bulb 43% to just $19.99. Use the Kasa app to turn on/off or dim from anywhere in the world. Set up a schedule, set the mood, and even control with your voice via an Alexa-enabled device such as Echo or Dot. Reviewers rate 4 out of 5 stars (see reviews) on Amazon, where you can get yourself one (or more) for just $20, a good deal considering it typically lists north of $20 and sometimes $30 with various online retailers. See the discounted TP-Link smart LED bulb on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The sky is streaming

Internet access has gone through several generations that started with dial-up modems. I still remember my “blazing fast” upgrade from 24 kbps to 56 kbps.Dial-up modems gave way to always-on broadband solutions. Initially there were two choices: Cable (DOCSIS) and telephone (DSL). Wireless (LTE) has emerged over the past few years as a viable option for connectivity beyond smartphones.Many investors think the next generation will be wireless connectivity. It’s unfortunate that “Skynet” is associated with the villainous, fictional neural machines from the Terminator movies because each of these solutions will deliver the internet from the sky. After all, the sky is where the clouds are.To read this article in full or to leave a comment, please click here

Low-end Android phones could get VR with new Imagination GPU

The company that provides GPUs to Apple's iPhones now wants to shake up the Android landscape by bringing high-quality VR experiences to low-end phones. GPUs from Imagination Technologies are used in both iPhones and Android handsets. The company's latest PowerVR Series8XE Plus GPU will be installed in Android handsets priced between US $200 and $400. The use of virtual reality in Android devices is growing fast. But most VR-capable phones, like the ones supporting Google's DayDream platform, are expensive because of powerful GPUs and high-resolution screens. Cheap VR headsets like Google Cardboard can be used with inexpensive phones, but the experience is uneven.To read this article in full or to leave a comment, please click here

25 most common passwords in 2016 and how quickly they can be cracked

It’s nearly that time again when SplashData will release its annual list of worst passwords, but this list of passwords comes from Keeper Security. The company analyzed over 10 million passwords available on the public web before publishing a list of 25 most common passwords of 2016.Keeper pointed a finger of blame at websites for not enforcing password best practices. Even if a site won’t help you determine if a password is decent, then people could use common sense. It’s disheartening to know that 17% of people are still trying to safeguard their accounts with “123456.” And “password” is of course still on the list as well as keyboard patterns such as “qwerty” and “123456789”.To read this article in full or to leave a comment, please click here

25 most common passwords in 2016 and how quickly they can be cracked

It’s nearly that time again when SplashData will release its annual list of worst passwords, but this list of passwords comes from Keeper Security. The company analyzed over 10 million passwords available on the public web before publishing a list of 25 most common passwords of 2016.Keeper pointed a finger of blame at websites for not enforcing password best practices. Even if a site won’t help you determine if a password is decent, then people could use common sense. It’s disheartening to know that 17 percent of people still try to safeguard their accounts with “123456.” And “password” is, of course, still on the list, as well as keyboard patterns such as “qwerty” and “123456789”.To read this article in full or to leave a comment, please click here

When real-time threat detection is essential

Finding the bad guys right awayImage by ThinkstockWhile organizations always want to find threats as quickly as possible, that ideal is far from being met. On average, dwell times last months and give cyber criminals all the time they need to peruse a network and extract valuable information that can impact a company, its customers and its employees.To read this article in full or to leave a comment, please click here

When real-time threat detection is essential

Finding the bad guys right awayImage by ThinkstockWhile organizations always want to find threats as quickly as possible, that ideal is far from being met. On average, dwell times last months and give cyber criminals all the time they need to peruse a network and extract valuable information that can impact a company, its customers and its employees.To read this article in full or to leave a comment, please click here

8 data storage and recovery tips

Today, small businesses have as many (or nearly as many) options for data storage as much larger businesses. But with so many data storage options, how do you choose the right one for your business? Here’s how can you ensure your critical data will be available in the event of a disaster.To read this article in full or to leave a comment, please click here(Insider Story)

How core values shape these 5 tech giants

Growing from a startup to a large business requires consistent focus and dedication, and you can typically find those driving principles in a company's mission statement. While mission statements are usually more for investors or employees, they're a great way to find out what your favorite companies value.These five companies have embraced strong corporate values, each operating under a unique set of guidelines that have helped these once, small companies grow into the tech giants they are today.Twitter The company's mission statement is one simple sentence, "To give everyone the power to create and share ideas and information instantly, without barriers." One might argue that, technically, there is one barrier -- and that's the 140-character limit on Tweets, but let's not split hairs. Ultimately, Twitter wants to help create "free and global conversation," with a focus on constantly improving that discussion, rather than distracting from it.To read this article in full or to leave a comment, please click here

69% off Phaiser BHS-730 Bluetooth Sweatproof Sport Earbuds, Magnetic – Deal Alert

Phaiser's BHS-730 Bluetooth Sport earbuds are both highly rated and dramatically discounted on Amazon. Averaging 4.5 out of 5 stars on Amazon from over 7,800 people (read reviews), the list price of $160 has been reduced a significant 69% to just $50.  The BHS-730 uses the highest quality hardware, as well as Bluetooth 4.1 and A2DP stereo transfer protocols to produce bigger bass, lighter-than-air treble, and perfect phone call clarity every time. Bullet-shaped Comply T-400 M memory foam tips provide total isolation from external noise. It's designed to withstand the toughest environments, and the earbuds are made from Aviation Grade Aluminum-Magnesium-Alloy which doesn't add weight. And a LiquipelTM Nano-Coating means it can be dropped into water and will live to see another day. The BHS-730's are magnetized, so they stick to each other and stay securely around your neck when you need to take them out of your ears. Along with the earbuds you get a generous 7 sets of ear tips, a 60-day "no questions asked" return policy, and a lifetime sweatproof warranty as well. See the discounted Phaiser BHS-730 now on Amazon. To read this article in full or to leave a comment, please click here

6 tips for negotiating your next raise

In a recovering economy and a tight IT talent market, you have more leverage when angling for a raise. And the beginning of a new calendar year is a great time to ask for more money, as budgets are new and organizations begin to execute on their strategy and goals for the upcoming year.To read this article in full or to leave a comment, please click here(Insider Story)

Don’t become a dead-end developer

If you’re getting unclear direction from the boss, working long hours without proper compensation, or feeling like you can’t speak up, your career may already be accelerating toward a dead end. These are only a few of the symptoms of an engineering job gone wrong.Or maybe you feel like you’ve been pegged: the invisible developer, the awkward communicator, the underachiever. You’re juggling multiple projects, chasing bugs, learning new skills, but you don’t feel like you’re growing, and your career trajectory looks flat.[ Find out how to get ahead with our career development guide for developers. | The art of programming is changing rapidly. We help you navigate what's hot in programming and what's going cold. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ] What can you do about it?To read this article in full or to leave a comment, please click here

Why Linux users should worry about malware and what they can do about it

Preventing the spread of malware and/or dealing with the consequences of infection are a fact of life when using computers. If you’ve migrated to Linux or Mac seeking refuge from the never-ending stream of threats that seems to target Windows, you can breath a lungful of fresh air—just don’t let your guard down.Though UNIX-like systems such as Mac OS X and Linux can claim fewer threats due to their smaller user bases, threats do still exist. Viruses can be the least of your problem too. Ransomware, like the recent version of KillDisk, attacks your data and asks you to pay, well, a king’s ransom to save your files. (In the case of KillDisk, even paying the ransom can’t save you if you’re running Linux.)To read this article in full or to leave a comment, please click here

Why Linux users should worry about malware and what they can do about it

Preventing the spread of malware and/or dealing with the consequences of infection are a fact of life when using computers. If you’ve migrated to Linux or Mac seeking refuge from the never-ending stream of threats that seems to target Windows, you can breath a lungful of fresh air—just don’t let your guard down.Though UNIX-like systems such as Mac OS X and Linux can claim fewer threats due to their smaller user bases, threats do still exist. Viruses can be the least of your problem too. Ransomware, like the recent version of KillDisk, attacks your data and asks you to pay, well, a king’s ransom to save your files. (In the case of KillDisk, even paying the ransom can’t save you if you’re running Linux.)To read this article in full or to leave a comment, please click here

The war for cybersecurity talent hits the Hill

Many analysts and business leaders believe there is a severe need for qualified cybersecurity professionals in the U.S., something that has caught the eye of at least one key congressman.U.S. House Homeland Security Committee Chairman Michael McCaul (R-Texas) on Wednesday said more needs to be done to address the cybersecurity labor shortage.[To comment on this story, visit Computerworld's Facebook page.]"I agree 110% that we need to strengthen the workforce" of cybersecurity professionals, McCaul said during a meeting with reporters at the National Press Club.To read this article in full or to leave a comment, please click here