Archive

Category Archives for "Networking"

South Dakota law will be a test case for a US Internet sales tax

A new South Dakota law may end up determining whether most U.S. residents are required to pay sales taxes on their Internet purchases.The South Dakota law, passed by the Legislature there in March, requires many out-of-state online and catalog retailers to collect the state's sales tax from customers. The law is shaping up to be a legal test case challenging a 25-year-old U.S. Supreme Court ruling that prohibits states from levying sales taxes on remote purchases.+ PAST STORY: US residents oppose Internet sales tax +To read this article in full or to leave a comment, please click here

Panama Papers leak explained: What you need to know about the Mossack Fonseca hack

You've doubtless heard about the Panama Papers, a leak of 2.6TB of documents from the one of the world's largest offshore law firms, Mossack Fonseca. The dump of over 11 million files containing detailed financial information on 214,000 companies illustrates how offshore tax havens are exploited.Whatever you may think of Mossack Fonseca's business dealings, there are lessons to be learned about what the company could have — and should have — done to ensure that its clients' data was protected.[ Related: What's the deal with the massive Panama Papers data leak? ]To read this article in full or to leave a comment, please click here(Insider Story)

Panama Papers leak explained: What you need to know about the Mossack Fonseca hack

You've doubtless heard about the Panama Papers, a leak of 2.6TB of documents from the one of the world's largest offshore law firms, Mossack Fonseca. The dump of over 11 million files containing detailed financial information on 214,000 companies illustrates how offshore tax havens are exploited.To read this article in full or to leave a comment, please click here(Insider Story)

21% off LG Nexus 5X Unlocked Smartphone 32GB – Deal Alert

Averaging 4 out of 5 stars on Amazon from over 480 people (read reviews), this LG Nexus 5X unlocked, multi-mode phone will work on all US carriers including AT&T, Verizon, T-Mobile and Sprint, as well as MVNO's (Mobile Virtual Network Operators) and most international carriers. It features Android 6.0 Marshmallow, a fingerprint sensor, new USB Type-C charger, and a powerful camera. Under its 5.2-inch display is a hexa-core Snapdragon 808 processor for world-class speed at an affordable price, which right now gets just a bit more affordable. With a list price of $429.99, you can save $80 now and buy it on Amazon for $349.99.To read this article in full or to leave a comment, please click here

10 best-paying companies in tech

Best-paying companies in techImage by ThinkstockThe modern business world runs on technology, which means companies need people to manage it. Getting a job in STEM is a great way to not only ensure job security, but also earn a six figure salary. Glassdoor -- a website that offers reviews, salaries and benefits information provided by employees on companies from all industries -- collects salary data on the biggest tech companies in the U.S. to determine the 10 highest paying tech companies. Using their self-reported data, Glassdoor calculated the average total compensation and median base salary for companies across every industry. These are the top 10 technology companies that report the highest average salaries. Juniper NetworksImage by ThinkstockTo read this article in full or to leave a comment, please click here

How to identify, engage and nurture high-potential talent

In a tight talent market, succession planning should be a core part of any business's workforce management and development plan. Building a pipeline of talent ready to take on progressively greater responsibility and leadership in an organization is key to driving success, especially in the constantly evolving IT market.To read this article in full or to leave a comment, please click here(Insider Story)

How to counter outsourcers’ cost of living adjustments

For years, most large outsourcing contracts have included standard provisions for annual pricing adjustments based on consumer price indices and other economic indicators. These cost of living adjustments are intended to normalize services fees with economic conditions over the life of long-term deals. The impact on pricing can be significant—in the millions of dollars for a large deal. A $50 million annual services contract with a 2.75 percent cost of living adjustment could mean a $1.375 million increase in annual fees.  In theory, cost of living adjustments help service providers reduce attrition by ensuring that employee salaries keep up with market trends. Staff retention benefits providers and allows clients to avoid the disruption of employee turnover.To read this article in full or to leave a comment, please click here

Windows 10 on pace to reach 20% share by June

Windows 10 is on pace to power 20% of all Windows desktop systems by the end of June, or around the time Microsoft issues its next major upgrade, according to data published this week.Data from U.S.-based analytics vendor Net Applications pegged Windows 10's user share -- a proxy for the percentage of personal computers worldwide that ran the OS -- at 15.3% in April, a 1.2-percentage point increase from the month prior. Net Applications tallied unique visitors to clients' websites to come up with its measurements.The new operating system's growth last month was smaller than in January and March of this year, but larger than February's.To read this article in full or to leave a comment, please click here

Quantum computers pose a huge threat to security, and the NIST wants your help

It's no secret that quantum computers could render many of today's encryption methods useless, and now the U.S. National Institute of Standards and Technology wants the public to help it head off that threat.The federal agency recently published a report focusing on cryptography in a quantum world that outlines a long-term approach for avoiding the problem before it happens."There has been a lot of research into quantum computers in recent years, and everyone from major computer companies to the government want their cryptographic algorithms to be what we call 'quantum resistant,'" said NIST mathematician Dustin Moody. "So if and when someone does build a large-scale quantum computer, we want to have algorithms in place that it can't crack."To read this article in full or to leave a comment, please click here

Quantum computers pose a huge threat to security, and the NIST wants your help

It's no secret that quantum computers could render many of today's encryption methods useless, and now the U.S. National Institute of Standards and Technology wants the public to help it head off that threat.The federal agency recently published a report focusing on cryptography in a quantum world that outlines a long-term approach for avoiding the problem before it happens."There has been a lot of research into quantum computers in recent years, and everyone from major computer companies to the government want their cryptographic algorithms to be what we call 'quantum resistant,'" said NIST mathematician Dustin Moody. "So if and when someone does build a large-scale quantum computer, we want to have algorithms in place that it can't crack."To read this article in full or to leave a comment, please click here

Security ‘net: Privacy and Cybercrime Edition

DDoS blackmail is an increasingly common form of cybercrime, it appears. The general pattern is something like this: the administrator of a large corporate site receives an email, threatening a large scale DDoS attack unless the company deposits some amount of bitcoin in an untraceable account. Sometimes, if the company doesn’t comply, the blackmail is followed up with a small “sample attack,” and a second contact or email asking for more bitcoin than the first time.

The best reaction to these types of things is either to work with your service provider to hunker down and block the attack, or to simply ignore the threat. For instance, there has been a spate of threats from someone called Armada Collective over the last several weeks that appear to be completely empty; while threats have been reported, no action appears to have been taken.

We heard from more than 100 existing and prospective CloudFlare customers who had received the Armada Collective’s emailed threats. We’ve also compared notes with other DDoS mitigation vendors with customers that had received similar threats. -via Cloudflare

The bottom line is this: you should never pay against these threats. It’s always better to contact your provider and work Continue reading

Kaspersky predicts application-layer DDoS attacks will increase

Monday is still the busiest day of the week for DDoS attacks with Thursday replacing Tuesday as the second most active day.According to Kaspersky Lab’s DDoS intelligence report covering the first quarter of 2016, 74 countries were targeted by DDoS attacks, with China, South Korea and the USA as the top three most-targeted countries. There was slight drop in the percentage of attacks targeting resources in the USA.SYN, TCP and HTTP were the top three most popular DDoS attack methods in Q1. Kaspersky Lab's Q1 2016 DDoS Intelligence Report Most botnet attacks are launched from Windows, 55.5% in Q1 2016, compared to 44.5% being Linux-based attacks. South Korea still has the most C&C servers, followed by China, “other,” USA, Russia, a tie by Great Britain and the Netherlands, followed by France.To read this article in full or to leave a comment, please click here

Application-layer DDoS attacks will increase, Kaspersky Labs predicts

Monday is still the busiest day of the week for DDoS attacks, with Thursday replacing Tuesday as the second most-active day.According to Kaspersky Lab’s DDoS intelligence report covering the first quarter of 2016, 74 countries were targeted by DDoS attacks, with China, South Korea and the the United States as the top three most-targeted countries. There was slight drop in the percentage of attacks targeting resources in the U.S.SYN, TCP and HTTP were the top three most-popular DDoS attack methods in Q1.To read this article in full or to leave a comment, please click here