Archive

Category Archives for "Networking"

How to maintain security while employees are out of the office for the holidays

Ho-ho, whoaImage by ThinkstockThe downtime created by the holiday season is a fan favorite for enterprise employees and hackers alike. As workers are enjoying time away from the office for vacations or working remotely, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security professionals provide tips for IT managers to protect corporate data, as well as share recommendations for using the slower cycles to test security systems. To read this article in full or to leave a comment, please click here

How to maintain security while employees are out of the office for the holidays

Ho-ho, whoaImage by ThinkstockThe downtime created by the holiday season is a fan favorite for enterprise employees and hackers alike. As workers are enjoying time away from the office for vacations or working remotely, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security professionals provide tips for IT managers to protect corporate data, as well as share recommendations for using the slower cycles to test security systems. To read this article in full or to leave a comment, please click here

Protecting more than privacy in schools

Larger enterprises have the resources to not only afford the technology needed to grow in the digital age, but they also have the budget and manpower to build security into their overall ecosystems.Does the K-12 education sector have the means to do the same? As the use of technology becomes more prevalent in public schools, will collecting more data potentially increase the cybersecurity risks for the K-12 sector?Earlier this fall, the Center for Data Innovation released a report, Building a Data-Driven Education System in the United States, in which they said 93 percent of teachers are regularly using digital tools to assist classroom instruction in some capacity.To read this article in full or to leave a comment, please click here

Protecting more than privacy in schools

Larger enterprises have the resources to not only afford the technology needed to grow in the digital age, but they also have the budget and manpower to build security into their overall ecosystems.Does the K-12 education sector have the means to do the same? As the use of technology becomes more prevalent in public schools, will collecting more data potentially increase the cybersecurity risks for the K-12 sector?Earlier this fall, the Center for Data Innovation released a report, Building a Data-Driven Education System in the United States, in which they said 93 percent of teachers are regularly using digital tools to assist classroom instruction in some capacity.To read this article in full or to leave a comment, please click here

Privacy protections for wearable devices are weak, study says

The rapidly expanding wearable device market raises serious privacy concerns, as some device makers collect a massive amount of personal data and share it with other companies, according to a new study.Existing health privacy laws don't generally apply to wearable makers, the study says. While consumers are embracing fitness trackers, smart watches, and smart clothing, a "weak and fragmented" health privacy regulatory system in the U.S. fails to give consumers the privacy protections they may expect, said the study, released Thursday by the Center for Digital Democracy and the School of Communication at American University.To read this article in full or to leave a comment, please click here

Privacy protections for wearable devices are weak, study says

The rapidly expanding wearable device market raises serious privacy concerns, as some device makers collect a massive amount of personal data and share it with other companies, according to a new study.Existing health privacy laws don't generally apply to wearable makers, the study says. While consumers are embracing fitness trackers, smart watches, and smart clothing, a "weak and fragmented" health privacy regulatory system in the U.S. fails to give consumers the privacy protections they may expect, said the study, released Thursday by the Center for Digital Democracy and the School of Communication at American University.To read this article in full or to leave a comment, please click here

The top 10 PC technologies and trends to watch in 2017

Though some critics love to knock PCs as dinosaurs, laptops and desktops have gotten sexier, faster and even smarter. For every blue screen of death, there are droves of technological enhancements driving PCs into the era of virtual reality, 4K video and 5G connectivity. Here are the top 10 PC technology and trends to watch next year.VR PCs on your head Intel/IDGNS An Intel employee demonstrates the company's Project Alloy headset on stage during IDF 2016 in San Francisco on August 16, 2016.To read this article in full or to leave a comment, please click here

California mandates energy-efficiency standards for computers

California has become the first state in the U.S. to mandate energy-efficiency standards for monitors and a variety of computers, including notebooks, desktops, workstations and servers.The standards, which come into force starting from from Jan. 1, 2018, focus on the performance of computers in idle, sleep and off modes rather than putting limits on when they are in active operation, said the California Energy Commission, which on Wednesday adopted the new standards.California has more than 25 million computer monitors installed in homes and businesses, and the new standards recommend the use of higher efficiency LED backlights and screen technologies.To read this article in full or to leave a comment, please click here

51% off Apple USB-C to Lightning Cable – Deal Alert

This USB-C cable connects your iPhone, iPad, or iPod with Lightning connector to your computer's USB-C port for syncing and charging.  Currently discounted 51% on Amazon from Apple, taking its typical list price down to just $19. See the discounted cable on Amazon. To read this article in full or to leave a comment, please click here

Arista wins big in latest court patent case go-around over Cisco

In rejecting a $335 million damage award to Cisco, a California jury gave Arista Networks a key verdict in part of the expansive patent infringement lawsuit the two networking companies are fighting over.While the jury found Arista had copied some of Cisco Command Line Interface it declined to award in damages. The jury also found that Arista did not infringe the single patent remaining in the case as well as Cisco’s asserted copyrights in its user manuals.+More on Network World: Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety+To read this article in full or to leave a comment, please click here

Arista wins big in latest court patent case go-around over Cisco

In rejecting a $335 million damage award to Cisco, a California jury gave Arista Networks a key verdict in part of the expansive patent infringement lawsuit the two networking companies are fighting over.While the jury found Arista had copied some of Cisco Command Line Interface it declined it declined to award in damages. The jury also found that Arista did not infringe the single patent remaining in the case as well as Cisco’s asserted copyrights in its user manuals.+More on Network World: Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety+To read this article in full or to leave a comment, please click here

Yahoo breach means hackers had three years to abuse user accounts

Security researchers are disturbed it took Yahoo three years to discover that details of over 1 billion user accounts had been stolen back in 2013.It means that someone -- possibly a state-sponsored actor -- had access to one of the largest email user bases in the world, without anyone knowing. The stolen database may have even included information on email ids of U.S. government and military employees.“It is extremely alarming that Yahoo didn’t know about this,” said Alex Holden, chief information security officer with Hold Security.Yahoo said back in November it first learned about the breach when law enforcement began sharing with the company stolen data  that had been provided by a hacker. At the time, the company was already dealing with a separate data breach, reported in September, involving 500 million user accounts.To read this article in full or to leave a comment, please click here

Yahoo breach means hackers had three years to abuse user accounts

Security researchers are disturbed it took Yahoo three years to discover that details of over 1 billion user accounts had been stolen back in 2013.It means that someone -- possibly a state-sponsored actor -- had access to one of the largest email user bases in the world, without anyone knowing. The stolen database may have even included information on email ids of U.S. government and military employees.“It is extremely alarming that Yahoo didn’t know about this,” said Alex Holden, chief information security officer with Hold Security.Yahoo said back in November it first learned about the breach when law enforcement began sharing with the company stolen data  that had been provided by a hacker. At the time, the company was already dealing with a separate data breach, reported in September, involving 500 million user accounts.To read this article in full or to leave a comment, please click here

17% off Wonder Workshop Dash Robot – Deal Alert

Dash is a real robot that makes learning to code fun for kids. Responding to voice, navigating objects, dancing, and singing, Dash is the robot you always dreamed of having. Use the free iOS, Android and Kindle Fire apps to create new behaviors for Dash – doing more with robotics than ever possible. Dash presents your kids with hundreds of projects, challenges, and puzzles as well as endless possibilities for freeform play. Dash Robot averages 4 out of 5 stars from over 150 customers on Amazon (read reviews), where its typical list price of $150 has been reduced 17% to $125. See it on Amazon.To read this article in full or to leave a comment, please click here

Here’s some questions Congress should ask about the election-related hacks

Members of congress are demanding answers over claims that Russia attempted to influence the U.S. presidential election with several high-profile hacks. U.S. intelligence agencies are confident that the Kremlin was involved, but incoming president Donald Trump remains skeptical.  As they prepare to investigate, here’s some questions lawmakers should be asking to help them understand and respond to these hacks.  What evidence do we have proving Russia’s involvement? Attribution in any hack can be incredibly difficult, as Trump noted in a tweet, but cybersecurity experts say they have technical evidence showing that Democratic groups and figures were at the very least hacked with spear phishing emails and hard-to-detect malware from two suspected Russian hacking teams.To read this article in full or to leave a comment, please click here