Archive

Category Archives for "Networking"

New PCs will be more desirable with Windows 10 Anniversary Update

Windows 10 was expected to save the slumping PC market, but it hasn't. PC shipments are still declining, and people haven't bought new hardware just to get Windows 10.But the Windows 10 Anniversary Update has features that will make new hardware desirable. Moreover, the period to upgrade for free to Windows 10 from older versions has ended, and analysts believe people will buy a new PC instead of shelling out $119.99 to $199.99 for a Windows 10 license.PC makers hope for nothing more than the death of Windows 7, which some users -- especially businesses -- have been hanging on to. Companies like Lenovo and HP are slowly getting rid of lingering Windows 7 Professional PC models, which will ultimately force holdover users to Windows 10. To read this article in full or to leave a comment, please click here

27% off Belkin QODE Ultimate Keyboard Case for iPad Air – Deal Alert

Turn your iPad Air into a laptop with the Belkin QODE Ultimate Keyboard Case. The well-spaced keys offer the movement and response of a laptop keyboard, making emails and word processing far easier and more comfortable than typing on a tablet's touchscreen. Smart sensing technology automatically turns the keyboard on when you need to use it, and off when you don't. The case supports multiple viewing angles to help you find the most comfortable position for watching videos or reading blogs. Made of aircraft grade aluminum, the lightweight keyboard acts as a cover offering exceptional protection for your iPad Air while the case prevents it from being scratched. Averages 4 out of 5 stars on Amazon from over 750 people (read reviews). It's list price of $130 has been reduced significantly to just over $94. See it now on Amazon.To read this article in full or to leave a comment, please click here

53% off Inateck USB 3.0 Dual-Bay Hard Drive Cloning Station – Deal Alert

This gadget from Inateck will duplicate any 2.5 inch or 3.5 inch SATA HDD/SSD drive quickly and automatically without the need for a computer, by just pushing a button. Once cloning has started, an LED indicator shows you 25%, 50%, 75%, and 100% completion status. Or don't kick off the cloning process, and the unit allows you to move files freely between drives as you would an external HDD/SSD. Built-in safeguards protect against overheating, overvoltage, current leaks, short circuits, peak voltage, and other disturbances to ensure safe data access and transfers. The unit currently averages 4.5 out of 5 stars on Amazon from over 720 customers (read reviews). With a typical list price of $79.99, this 53% off deal puts it at just $37.99. See the discounted Inateck HDD/SSD cloning station now on Amazon.To read this article in full or to leave a comment, please click here

The People Versus Security

PinkLock

It all comes back to people. People are the users of the system. They are the source of great imagination and great innovation. They are also the reason why security professionals pull their hair out day in and day out. Because computer systems don’t have the capability to bypass, invalidated, and otherwise screw up security quite like a living, breathing human being.

Climb Every Mountain

Security is designed to make us feel safe. Door locks keep out casual prowlers. Alarm systems alert us when our home or business is violated. That warm fuzzy feeling we get when we know the locks are engaged and we are truly secure is one of bliss.

But when security gets in our way, it’s annoying. Think of all the things in your life that would be easier if people just stopped trying to make you secure. Airport security is the first that comes to mind. Or the annoying habit of needing to show your ID when you make a credit card purchase. How about systems that scan your email for data loss prevention (DLP) purposes and kick back emails with sensitive data that you absolutely need to share?

Security only benefits us when it’s Continue reading

Stealing payment card data and PINs from POS systems is dead easy

Many of the large payment card breaches that hit retail and hospitality businesses in recent years were the result of attackers infecting point-of-sale systems with memory-scraping malware. But there are easier ways to steal this sort of data, due to a lack of authentication and encryption between card readers and the POS payment applications.POS systems are specialized computers. They typically run Windows and have peripherals like keyboards, touch screens, barcode scanners and card readers with PIN pads. They also have specialized payment applications installed to handle transactions.One of the common methods used by attackers to steal payment card data from PoS systems is to infect them with malware, via stolen remote support credentials or other techniques. These malware programs are known as memory or RAM scrapers because they scan the system's memory for credit card data when it's processed by the payment application on the POS system.To read this article in full or to leave a comment, please click here

Stealing payment card data and PINs from POS systems is dead easy

Many of the large payment card breaches that hit retail and hospitality businesses in recent years were the result of attackers infecting point-of-sale systems with memory-scraping malware. But there are easier ways to steal this sort of data, due to a lack of authentication and encryption between card readers and the POS payment applications.POS systems are specialized computers. They typically run Windows and have peripherals like keyboards, touch screens, barcode scanners and card readers with PIN pads. They also have specialized payment applications installed to handle transactions.One of the common methods used by attackers to steal payment card data from PoS systems is to infect them with malware, via stolen remote support credentials or other techniques. These malware programs are known as memory or RAM scrapers because they scan the system's memory for credit card data when it's processed by the payment application on the POS system.To read this article in full or to leave a comment, please click here

How tech’s all-stars are playing the Olympics

From Aug. 5 to Aug. 21 the world will be watching Brazil as it hosts the Games of the XXXI Olympiad; and some of the biggest names in technology are helping put on the show.More than 10,500 athletes from 206 countries (including 555 U.S. Olympians) are expected to compete in 28 sports and 306 events at 37 venues over the course of the 16-day event.Technology companies aren’t just supplying technology; they’re also helping to sponsor the games. Atos, a European IT services company is a Worldwide Olympic Partner; Cisco is an official Olympics supporter and Microsoft and Symantec are official Olympic suppliers.+ MORE OLYMPICS: Rio Olympics pose security risks to travelers +To read this article in full or to leave a comment, please click here

How tech’s all-stars are playing the Olympics

From Aug. 5 to Aug. 21 the world will be watching Brazil as it hosts the Games of the XXXI Olympiad; and some of the biggest names in technology are helping put on the show.More than 10,500 athletes from 206 countries (including 555 U.S. Olympians) are expected to compete in 28 sports and 306 events at 37 venues over the course of the 16-day event.Technology companies aren’t just supplying technology; they’re also helping to sponsor the games. Atos, a European IT services company is a Worldwide Olympic Partner; Cisco is an official Olympics supporter and Microsoft and Symantec are official Olympic suppliers.+ MORE OLYMPICS: Rio Olympics pose security risks to travelers +To read this article in full or to leave a comment, please click here

Black Hat: Be wary of HTTP/2 on Web servers

Researchers at Black Hat describe finding four flaws – now fixed - in the way the major server vendors implemented HTTP/2, but warn that the year-old Web protocol remains fertile ground for hackers seeking weaknesses in the way it’s rolled out.+More on Network World: IRS warns on super summer scam scourge | Follow all the coverage from Black Hat +A team at security vendor Imperva says they found nothing vulnerable about the protocol itself, but that they created distributed denial-of-service attacks that took advantage of openings left by how servers support the protocol.To read this article in full or to leave a comment, please click here

Black Hat: Be wary of HTTP/2 on Web servers

Researchers at Black Hat describe finding four flaws – now fixed - in the way the major server vendors implemented HTTP/2, but warn that the year-old Web protocol remains fertile ground for hackers seeking weaknesses in the way it’s rolled out.+More on Network World: IRS warns on super summer scam scourge | Follow all the coverage from Black Hat +A team at security vendor Imperva says they found nothing vulnerable about the protocol itself, but that they created distributed denial-of-service attacks that took advantage of openings left by how servers support the protocol.To read this article in full or to leave a comment, please click here

FAA authorizes private robotic space shot to the moon

The Federal Aviation Administration this week granted permission to a privately-held space firm to launch a robotic spacecraft to the moon. Moon Express expects to launch its MX-1 spacecraft on a two-week mission to the lunar surface in 2017.   The MX-1, which is about as large as a suitcase will include instruments and a camera to explore the moon’s surface. +More on Network World: NASA: Top 10 space junk missions+ “The MX-1E is a spacecraft/lander capable of transfer from Earth orbit to the Moon, making a soft landing on the lunar surface, and performing post-landing relocations through propulsive ‘hops,’” the FAA stated. The FAA Office of Commercial Space Transportation holds controlling powers over space launches and their payloads.To read this article in full or to leave a comment, please click here

FAA authorizes private robotic space shot to the moon

The Federal Aviation Administration this week granted permission to a privately-held space firm to launch a robotic spacecraft to the moon. Moon Express expects to launch its MX-1 spacecraft on a two-week mission to the lunar surface in 2017.   The MX-1, which is about as large as a suitcase will include instruments and a camera to explore the moon’s surface. +More on Network World: NASA: Top 10 space junk missions+ “The MX-1E is a spacecraft/lander capable of transfer from Earth orbit to the Moon, making a soft landing on the lunar surface, and performing post-landing relocations through propulsive ‘hops,’” the FAA stated. The FAA Office of Commercial Space Transportation holds controlling powers over space launches and their payloads.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The future of BPO services: Embrace automation or perish

The outsourcing of business processes—save call centers and payroll processing—began in earnest in the mid-1990s. Business process outsourcing (BPO) walked pretty nicely in the footsteps of the IT services industry, garnering attention as a potential growth engine for both pure-play BPO providers and IT providers offering BPO services.But despite early predictions, this service segment did not grow as fast as expected and in recent years has slowed. What happened to this shiny new toy?+ Also on Network World: Top 5 factors driving domestic IT outsourcing growth +To read this article in full or to leave a comment, please click here

IDG Contributor Network: The future of BPO services: Embrace automation or perish

The outsourcing of business processes—save call centers and payroll processing—began in earnest in the mid-1990s. Business process outsourcing (BPO) walked pretty nicely in the footsteps of the IT services industry, garnering attention as a potential growth engine for both pure-play BPO providers and IT providers offering BPO services.

But despite early predictions, this service segment did not grow as fast as expected and in recent years has slowed. What happened to this shiny new toy?

+ Also on Network World: Top 5 factors driving domestic IT outsourcing growth +

To read this article in full or to leave a comment, please click here