Archive

Category Archives for "Networking"

Here’s to our health, with help from Watson

IBM may have originally built Watson to win at Jeopardy, but it saw potential applications in healthcare early on. Eventually, it formed a dedicated business unit focused squarely on making those applications happen. As far back as 2012, Memorial Sloan-Kettering Cancer Center and IBM teamed up to develop a Watson-based system that could help doctors create individualized cancer treatment recommendations for their patients. The following year, IBM, Memorial Sloan-Kettering and WellPoint introduced products based on Watson. A project with Cleveland Clinic, meanwhile, focused on developing a new tool to help physicians and medical students learn how to make better decisions more quickly.To read this article in full or to leave a comment, please click here

Omron’s table tennis robot gets machine learning smarts

Omron's table tennis robot is getting smarter. At this week's Ceatec electronics show in Japan, the company has unveiled a new version that uses machine learning to assess the strength of an opponent and ramp up its game accordingly.The robot, named Forpheus, was first shown at the event in 2014 to impressive reviews. A series of robotic arms manipulate a table tennis bat, guided by cameras that watch the ball and predict where it's going to land.Omron developed the robot to promote the company's sensor technology and this latest version is showing off some of what can be done when sensing combines with machine learning and artificial intelligence.To read this article in full or to leave a comment, please click here

IDG Contributor Network: DDoS attacks using IoT devices follow The Manchurian Candidate model

In the movie The Manchurian Candidate, two soldiers are kidnapped and brainwashed into sleeper agents. Later the soldiers become unwitting assassins when activated by a handler.  Sound familiar? It should.Hackers use a similar model for Distributed Denial of Service (DDoS) attacks using IoT devices. This process has four phases. Capture: Identify and take over control of IoT devices Subvert: Reprogram the device to conduct malicious acts Activate: Instruct the hacked device to launch attack Attack: Launch the DDoS attack  Why are such attacks increasing? How can IoT device security be hardened? What DDoS protections are available? What advisory resources are available? Let’s take a look.To read this article in full or to leave a comment, please click here

IDG Contributor Network: DDoS attacks using IoT devices follow The Manchurian Candidate model

In the movie The Manchurian Candidate, two soldiers are kidnapped and brainwashed into sleeper agents. Later the soldiers become unwitting assassins when activated by a handler.  Sound familiar? It should.Hackers use a similar model for Distributed Denial of Service (DDoS) attacks using IoT devices. This process has four phases. Capture: Identify and take over control of IoT devices Subvert: Reprogram the device to conduct malicious acts Activate: Instruct the hacked device to launch attack Attack: Launch the DDoS attack  Why are such attacks increasing? How can IoT device security be hardened? What DDoS protections are available? What advisory resources are available? Let’s take a look.To read this article in full or to leave a comment, please click here

Deep-dive review: The iPhone 7 Plus is the best iPhone yet

Let's get this out of the way about the biggest change to the iPhone 7: The elimination of the old-style audio jack doesn't mean Apple is trying to force users to buy wireless AirPods. The iPhone 7 comes with wired headphones (that plug into the Lightning connector port), and it comes with a free adapter if you have your own headphones you'd rather use.If you're hung up on the missing audio jack, which you shouldn't be, then the iPhone 7 isn't for you. For everyone else, I'll be clear: The iPhone 7 is the best iPhone I've ever used - and I've owned every single version, dating back to 2007.To read this article in full or to leave a comment, please click here

How to keep IT security together in a company that’s gone bankrupt

Corporate chaosImage by peteThe supply chain upon which modern multinational commerce depends was thrown into chaos earlier this year when South Korea's Hanjin Shipping filed for bankruptcy. Dozens of container ships with hundreds of crew and thousands of pounds of cargo onboard were essentially stranded at sea, as ports barred the ships' entry for fear that they wouldn't be able to pay for docking services.To read this article in full or to leave a comment, please click here

How to keep IT security together in a company that’s gone bankrupt

Corporate chaosImage by peteThe supply chain upon which modern multinational commerce depends was thrown into chaos earlier this year when South Korea's Hanjin Shipping filed for bankruptcy. Dozens of container ships with hundreds of crew and thousands of pounds of cargo onboard were essentially stranded at sea, as ports barred the ships' entry for fear that they wouldn't be able to pay for docking services.To read this article in full or to leave a comment, please click here

How Shodan helped bring down a ransomware botnet

Shodan is a search engine that looks for internet-connected devices. Hackers use it to find unsecured ports and companies use it to make sure that their infrastructure is locked down. This summer, it was also used by security researchers and law enforcement to shut down a ransomware botnet.The Encryptor RaaS botnet offered ransomware as a service, allowing would-be criminals to get up and going quickly with their ransomware campaigns, without having to write code themselves, according to report released last week.The ransomware first appeared in the summer of 2015. It didn't make a big impact -- in March, Cylance reported that it had just 1,818 victims, only eight of whom had paid the ransom.To read this article in full or to leave a comment, please click here

How Shodan helped bring down a ransomware botnet

Shodan is a search engine that looks for internet-connected devices. Hackers use it to find unsecured ports and companies use it to make sure that their infrastructure is locked down. This summer, it was also used by security researchers and law enforcement to shut down a ransomware botnet.The Encryptor RaaS botnet offered ransomware as a service, allowing would-be criminals to get up and going quickly with their ransomware campaigns, without having to write code themselves, according to report released last week.The ransomware first appeared in the summer of 2015. It didn't make a big impact -- in March, Cylance reported that it had just 1,818 victims, only eight of whom had paid the ransom.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT security guidance emerges

More than a year ago, an eye-opening RAND study on cybersecurity comprehensively explored just how vulnerable the Internet of Things (IoT) is and was going to be. Afterthought-style patch-on-patch security, as well as significant vulnerability risks involved with slapping internet connectivity on previously non-connected objects, were among the startling findings and predictions in that report. Since then, questions have arisen as to just how one should approach the security needs of the soon-to-be billions of networked, smart, cheap sensors expanding around the globe like popcorn.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT security guidance emerges

More than a year ago, an eye-opening RAND study on cybersecurity comprehensively explored just how vulnerable the Internet of Things (IoT) is and was going to be. Afterthought-style patch-on-patch security, as well as significant vulnerability risks involved with slapping internet connectivity on previously non-connected objects, were among the startling findings and predictions in that report. Since then, questions have arisen as to just how one should approach the security needs of the soon-to-be billions of networked, smart, cheap sensors expanding around the globe like popcorn.To read this article in full or to leave a comment, please click here

40% off Weight Gurus Bluetooth Smart Connected Body Fat Scale with Backlit LCD – Deal Alert

This Bluetooth scale from Weight Gurus supports and auto-detects up to 8 users. The scale syncs results separately and securely, and integrates with FitBit, Apple’s Health app, Google Fit, and other popular apps. It measures weight, BMI, body fat, lean mass, water weight, & bone mass, displaying them on an extra-large, backlit LCD screen. Non-slip, scratch-resistant feet. 4 precise weighing sensors ensure an accuracy of +/- 0.2 lb. Large, tempered glass weighing surface holds up to 400 lbs. 4 AAA batteries included. The scale averages 4 out of 5 stars from over 1,600 people on Amazon (read reviews). Its typical list price of $100 has been reduced 40% to $60. See it now on Amazon.To read this article in full or to leave a comment, please click here

AWS September roundup: EC2 changes, new France region, and more

The days may be getting shorter up in the northern hemisphere, but that hasn't slowed the pace of updates to AWS. Amazon has kept on updating its cloud platform with a handful of quality-of-life changes, plus some major tweaks to how it handles Reserved Instances. Here's the rundown:Major changes to EC2 Reserved Instances One of the ways for customers to get discounts on compute capacity with Amazon's Elastic Compute Cloud is to sign up for Reserved Instances. Then they pay a set amount of money for the benefit of getting deep discounts on compute. It's something that Amazon introduced 8 years ago and has been an important part of the company's cloud offering since. Now, they're making some pretty big changes.To read this article in full or to leave a comment, please click here

Verizon may want a $1 billion discount on Yahoo

Verizon may be getting cold feet with its acquisition of Yahoo. Reportedly, it's asking for a $1 billion discount on the original $4.8 billion deal for the Internet company.Recent news about Yahoo's massive data breach and its alleged secret email scanning program has diminished the company's value in the eyes of Verizon, according to a Thursday report by the New York Post.Tim Armstrong, the head of AOL, which Verizon acquired in 2015, reportedly has met with Yahoo executives about reducing the acquisition price.  "He’s pretty upset about the lack of disclosure and he’s saying can we get out of this or can we reduce the price?" the report said, quoting what it called a source familiar with Verizon's thinking.To read this article in full or to leave a comment, please click here

Verizon may want a $1 billion discount on Yahoo

Verizon may be getting cold feet with its acquisition of Yahoo. Reportedly, it's asking for a $1 billion discount on the original $4.8 billion deal for the Internet company.Recent news about Yahoo's massive data breach and its alleged secret email scanning program has diminished the company's value in the eyes of Verizon, according to a Thursday report by the New York Post.Tim Armstrong, the head of AOL, which Verizon acquired in 2015, reportedly has met with Yahoo executives about reducing the acquisition price.  "He’s pretty upset about the lack of disclosure and he’s saying can we get out of this or can we reduce the price?" the report said, quoting what it called a source familiar with Verizon's thinking.To read this article in full or to leave a comment, please click here

How companies can deal with insider data theft

To learn that your company's confidential data was stolen -- not by any hacker, but by an employee -- is a nightmare scenario that no one wants to face.But it's also a risk that's very real. The recent arrest of a former NSA contractor suspected of stealing classified government files is just the latest high-profile example, and security experts say all companies need to be on guard against potential insider threats.How serious is the threat? It's not every day that thieving employees take to the digital black market to sell their company's sensitive information, but it does happen, and incidents have been occurring more frequently, said Andrei Barysevich, a director at security firm Flashpoint.To read this article in full or to leave a comment, please click here