Microsoft’s latest version of its anti-malware tool, Windows Defender, is a frustrating product to evaluate. Yes, it is perhaps the best antivirus tool to come from Microsoft, with a series of noteworthy improvements. Yes, it provides good enough protection for your family’s PCs. And yes, it could be your PC’s sole antivirus utility, if you are willing to accept its limitations.To read this article in full or to leave a comment, please click here(Insider Story)
Microsoft’s latest version of its anti-malware tool, Windows Defender, is a frustrating product to evaluate. Yes, it is perhaps the best antivirus tool to come from Microsoft, with a series of noteworthy improvements. Yes, it provides good enough protection for your family’s PCs. And yes, it could be your PC’s sole antivirus utility, if you are willing to accept its limitations.However, once you examine the product in more detail, you will see why we cannot recommend it for enterprise use. And that is the frustration of this product: Microsoft is trying to do the right thing and offers a tempting feast, but ultimately offers an incomplete meal that is tough to digest.To read this article in full or to leave a comment, please click here(Insider Story)
First: I’m not a lawyer. Net neutrality—the principle that no online traffic has priority over other traffic, not even for pay—might go away. If it does, big money will be behind its demise. The end of network neutrality will create many lasting problems, including these specific issues: 1. The lawyers win
Every conceivable new theory about how one organization should have priority will ensue, and the courts will be clogged deciding the outcome. Today, the principle is simple: all traffic gets the same priority, and multimedia can have isochronous priority, but it’s not guaranteed. + Also on Network World: How Trump will attack the FCC's net neutrality rules +
Without net neutrality, we will enter an era where ISPs, telcos, carriers and interconnects will all demand that THEIR traffic has priority, and yours does not—unless you pay. Let the litigation begin, and the courts glow in the dark in an attempt to sort out what theories of law now hold sway. Insert wallet, here. To read this article in full or to leave a comment, please click here
Happy new year cybersecurity community! Hope you are well rested, it’s bound to be an eventful year ahead.Way back when at the end of November 2016, I posted a blog about an evolutionary trend I see happening around cybersecurity analytics and operations technology. Historically, large enterprises have relied on SIEM products to anchor their SOCs. This will continue but I see SIEM becoming part of a more global cybersecurity software architecture called SOAPA (i.e. security operations and analytics platform architecture). SOAPA uses middleware (i.e. message queueing, transaction processing, etc.), APIs, and industry standards like CybOX, STIX, and TAXII to connect disparate cybersecurity analytics and operations tools and data sources like EDR, network security analytics, UBA/machine learning analytics systems, vulnerability scanners, security asset management, anti-malware sandboxes/cloud services, incident response platforms, and threat intelligence into a cohesive software architecture. In this way, disparate analytics tools can be used collectively to gain more context out of the data while accelerating processes and cybersecurity operations.To read this article in full or to leave a comment, please click here
Happy new year cybersecurity community! Hope you are well rested, it’s bound to be an eventful year ahead.Way back when at the end of November 2016, I posted a blog about an evolutionary trend I see happening around cybersecurity analytics and operations technology. Historically, large enterprises have relied on SIEM products to anchor their SOCs. This will continue but I see SIEM becoming part of a more global cybersecurity software architecture called SOAPA (i.e. security operations and analytics platform architecture). SOAPA uses middleware (i.e. message queueing, transaction processing, etc.), APIs, and industry standards like CybOX, STIX, and TAXII to connect disparate cybersecurity analytics and operations tools and data sources like EDR, network security analytics, UBA/machine learning analytics systems, vulnerability scanners, security asset management, anti-malware sandboxes/cloud services, incident response platforms, and threat intelligence into a cohesive software architecture. In this way, disparate analytics tools can be used collectively to gain more context out of the data while accelerating processes and cybersecurity operations.To read this article in full or to leave a comment, please click here
Happy new year, cybersecurity community! I hope you are well rested; it’s bound to be an eventful year.Way back when at the end of November 2016, I wrote a blog post about an evolutionary trend I see happening around cybersecurity analytics and operations technology. Historically, large enterprises have relied on SIEM products to anchor their security operations centers (SOCs). This will continue, but I see SIEM becoming part of a more global cybersecurity software architecture called SOAPA (security operations and analytics platform architecture). To read this article in full or to leave a comment, please click here
Happy new year, cybersecurity community! I hope you are well rested; it’s bound to be an eventful year.Way back when at the end of November 2016, I wrote a blog post about an evolutionary trend I see happening around cybersecurity analytics and operations technology. Historically, large enterprises have relied on SIEM products to anchor their security operations centers (SOCs). This will continue, but I see SIEM becoming part of a more global cybersecurity software architecture called SOAPA (security operations and analytics platform architecture). To read this article in full or to leave a comment, please click here
Do you have the nasty habit of knocking your laptop around? Meet Acer's tough-as-nails Chromebook 11 N7, designed to withstand a serious beating.The Chromebook 11 N7 has an 11.6-inch screen and is fortified with layers of protection to withstand drops. Acer has been so meticulous in ruggedizing the laptop that it's even difficult to remove key caps from the keyboard -- whether by accident or on purpose.Why did Acer construct such a Chromebook? It's targeted at educational institutions that issue laptops to students, who may be clumsy with PCs. The Chromebook 11 N7 is certainly more durable than the iPad, which has been given to students and can crack easily if mishandled.To read this article in full or to leave a comment, please click here
Conventional bicycles are undergoing a radical technological makeover that could change the way people ride and protect their bikes.
LeEco isn't reinventing the wheel with its new Smart Road and Smart Mountain bikes, but infusing them with dazzling technology derived from smartphones and self-driving cars. The bicycles have navigation, fitness and communication features, and even technology to track a stolen bike.
These new features are more than just bells and whistles -- they could be a blueprint of how future bikes could look. Transportation is the next big technology frontier, and LeEco's bikes are cool and smart.
The LeEco smart bikes will be available in the U.S. in the second quarter. A company spokeswoman said prices will be announced at a later date.To read this article in full or to leave a comment, please click here
Amazingly thin Windows 10 laptops and tablets will soon become available with Intel's new Kaby Lake chips, which were announced at CES. These chips, called 7th Generation Core, will extend laptop battery life to new highs, and bring new capabilities like 4K video. You'll also enjoy VR by connecting headsets to Kaby Lake laptops or tablets. There's a lot more to Kaby Lake, and here's what you can expect from PCs:
Thinner and lighter laptops
Laptops and tablets with Kaby Lake are so thin and light that their weight in a backpack is not noticeable, unless it's a fully loaded gaming PC. Samsung's new 13.3-inch Notebook 9 weighs an amazing 816 grams, but offers only seven hours of battery life. Low-power Kaby Lake chips will also be in laptops and 2-in-1 devices from Lenovo, HP, Acer and Dell that weigh 1 to 1.5 kilograms.To read this article in full or to leave a comment, please click here
Merging gaming PCs into low-end brands failed for PC makers like HP, but Dell is giving it a shot.
Dell is moving budget gaming PCs into the consumer Inspiron brand as it positions the premium Alienware PCs for a leap into the 4K and virtual reality era.
At CES, Dell introduced new Inspiron 7000 gaming laptops, which have the look and feel of Alienware PCs. With a starting price of US$799, the Inspiron 7000 models aren't as feature-packed as the new Alienware 13, 15, and 17 laptops, which were also announced at the show and will ship this month.
The Inspiron 7000 models -- which comes with 14- or 15.6-inch screens -- have processing and graphics punch with high-end Intel Core i7 H-series Kaby Lake CPUs and Nvidia GeForce GTX 1050 GPUs. It's the first Inspiron gaming laptop and the fastest in that brand.To read this article in full or to leave a comment, please click here
A lot of cool technologies are coming to Intel's latest NUCs, which are powerful mini-desktops that now boast the company's latest Kaby Lake chips.
A NUC packs all components tightly in a small PC that is light enough to be held in one hand. These mini-PCs are easily customizable and considered desktop replacements.
Some of the new NUCs have Thunderbolt 3 ports, Intel Iris Plus graphics for 4K video, and are ready for Intel's superfast Optane storage.
Intel has announced three new "tall" NUCs with 7th Generation Core i3, i5 and i7 chips, and two "short" NUCs with Core i3 and i5 chips. The "tall NUCs" are slightly larger and more powerful than the short NUCs.To read this article in full or to leave a comment, please click here
It took a year from proof of concept to in-the-wild attack, but ransomware for Android-based smart TVs is now here. As one victim discovered this Christmas, figuring out how to clean such an infection can be quite difficult.
Ransomware for Android phones has already been around for several years and security experts have warned in the past that it's only a matter of time until such malicious programs start affecting smart TVs, especially since some of them also run Android.
In November 2015, a Symantec researcher named Candid Wueest even went as far as to infect his own TV with an Android ransomware application to highlight the threat. While that infection was just a demonstration, this Christmas, the owner of an LG Electronics TV experienced the real deal.To read this article in full or to leave a comment, please click here
It took a year from proof of concept to in-the-wild attack, but ransomware for Android-based smart TVs is now here. As one victim discovered this Christmas, figuring out how to clean such an infection can be quite difficult.
Ransomware for Android phones has already been around for several years and security experts have warned in the past that it's only a matter of time until such malicious programs start affecting smart TVs, especially since some of them also run Android.
In November 2015, a Symantec researcher named Candid Wueest even went as far as to infect his own TV with an Android ransomware application to highlight the threat. While that infection was just a demonstration, this Christmas, the owner of an LG Electronics TV experienced the real deal.To read this article in full or to leave a comment, please click here
Organizations from the Fortune 100 to the 28 million small businesses in the United States are embracing mobility, Big Data, social media and cloud computing. This digital transformation in turn is placing crushing capacity demands on enterprise and small and mid-sized business networks.And while these “third-platform” technologies promise agility and speed, for many SMBs, the promise of faster business is too often stifled by legacy network infrastructure. The problem is the Wi-Fi networks many organizations depend on have sped past the capacity of ubiquitous Ethernet cabling to handle the high speeds needed for today’s digital business. Wireless Access Points (APs) today can transfer data faster than the Ethernet cables and network switch can support.To read this article in full or to leave a comment, please click here
Security researcher Claudio Guarnieri has experience working with journalists and human rights organizations which have exercised freedom of speech, reported on some form of corruption and wound up becoming targets because of it; their computers may be compromised with spying malware such as those in the hands of the Hacking Team, FinFisher or NSA to name but a few. Their electronic communications may be intercepted, messaging programs may be blocked. All of that may be because the journalists and human rights organizations in our modern connected society were standing up for what is right, being the voice of dissent, getting out the news about injustice.To read this article in full or to leave a comment, please click here
Security researcher Claudio Guarnieri has experience working with journalists and human rights organizations which have exercised freedom of speech, reported on some form of corruption and wound up becoming targets because of it; their computers may be compromised with spying malware such as those in the hands of the Hacking Team, FinFisher or NSA to name but a few. Their electronic communications may be intercepted, messaging programs may be blocked. All of that may be because the journalists and human rights organizations in our modern connected society were standing up for what is right, being the voice of dissent, getting out the news about injustice.To read this article in full or to leave a comment, please click here
There certainly was a ton of hype in Software Defined-WAN arena in 2016 but to be fair there was a lot of actual deployment of technology and services as well.In December Gartner wrote that spending on SD-WAN products will rise from $129 million in 2016 to $1.24 billion in 2020. “While WAN architectures and technologies tend to evolve at a very slow pace — perhaps a new generation every 10 to 15 years — the disruptions caused by the transformation to digital business models are driving adoption of SD-WAN at a pace that is unheard of in wide-area networking,” Gartner wrote.To read this article in full or to leave a comment, please click here
There certainly was a ton of hype in Software Defined-WAN arena in 2016 but to be fair there was a lot of actual deployment of technology and services as well.In December Gartner wrote that spending on SD-WAN products will rise from $129 million in 2016 to $1.24 billion in 2020. “While WAN architectures and technologies tend to evolve at a very slow pace — perhaps a new generation every 10 to 15 years — the disruptions caused by the transformation to digital business models are driving adoption of SD-WAN at a pace that is unheard of in wide-area networking,” Gartner wrote.To read this article in full or to leave a comment, please click here