Windows 10 will soon have a very different security system

Microsoft announced a new service called Windows Defender Advanced Threat Protection (WDATP) last year specifically for enterprises, meant to help detect, investigate and respond to attacks on their networks. It was released with the Windows 10 Anniversary Update and is built on the existing security in Windows 10. WDATP offers a new post-breach layer of protection to the Windows 10 security stack, as well as a cloud service to help detect threats that have made it past other defenses and trace how far they penetrated into the enterprise. To read this article in full or to leave a comment, please click here

Top Chinese Supercomputer Blazes Real-World Application Trail

China’s massive Sunway TaihuLight supercomputer sent ripples through the computing world last year when it debuted in the number-one spot on the Top500 list of the world’s fastest supercomputers. Delivering 93 teraflops of performance – and a peak of more than 125,000 teraflops – the system is nearly three times faster than the second supercomputer on the list (the Tianhe-2, also a Chinese system) and dwarfs the Titan system Oak Ridge National Laboratory, a Cray-based machine that is the world’s third-fastest system, and the fastest in the United States.

However, it wasn’t only the system’s performance that garnered a lot

Top Chinese Supercomputer Blazes Real-World Application Trail was written by Jeffrey Burt at The Next Platform.

New products of the week 2.13.17

New products of the weekImage by ZenossOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.USM AnywhereImage by alienvaultTo read this article in full or to leave a comment, please click here

New products of the week 2.13.17

New products of the weekImage by ZenossOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.USM AnywhereImage by alienvaultTo read this article in full or to leave a comment, please click here

How San Diego fights off 500,000 cyberattacks a day

Nearly 27 years of network and cybersecurity experience with the Department of Defense didn’t prepare Gary Hayslip for the collection of disparate technologies he encountered when he joined the city of San Diego. “Cities don't get rid of anything. If it works, why get rid of it? So you end up having a lot of diverse technologies connected together. You may have something that's 15 years old connected to stuff that's state of the art,” says Hayslip, whose DoD tenure included 20 years of active-duty military service and seven years working in civil service for the military. “Police cars, ambulances, libraries, water treatment facilities, golf courses … One of the things you learn real quickly: the city of San Diego is $4 billion business. And cities don’t shut down. They run 24/7,” he says. “My almost 27 years in DoD did not prepare me for how interesting city networks are."To read this article in full or to leave a comment, please click here(Insider Story)

10 super-user tricks to boost Windows 10 productivity

Whether you love it or hate it, Windows 10 is here to stay. Unlike previous versions of Windows, there are fewer readily apparent differences between versions. In other words, the Professional version looks a lot like the Home version and it can take some digging to figure out how to leverage the advanced features of Pro.To read this article in full or to leave a comment, please click here(Insider Story)

REVIEW: Windows 10 Yoga Book: The good, the bad, the useful

Lenovo has introduced tablets with unique designs over the years, and their latest Yoga Book, released in October, is one of the most intriguing examples. This hybrid device looks like a mini notebook, but it’s technically a tablet with a swing-open digital drawing and writing pad that can capture your handwriting or sketching when you use its included digital pen.To read this article in full or to leave a comment, please click here(Insider Story)

REVIEW: Windows 10 Yoga Book: The good, the bad, the useful

Lenovo has introduced tablets with unique designs over the years, and their latest Yoga Book, released in October, is one of the most intriguing examples. This hybrid device looks like a mini notebook, but it’s technically a tablet with a swing-open digital drawing and writing pad that can capture your handwriting or sketching when you use its included digital pen.To read this article in full or to leave a comment, please click here(Insider Story)

Expert: Line between cyber crooks and cyber spies getting more blurry

Cybercriminals acting on behalf of national governments and nation-backed espionage agents carrying out cybercrimes for cash on the side is the future of security threats facing corporations and governments, says the former top U.S. attorney in charge of the Department of Justice’s national security division. Morrison & Foerster John Carlin “I think this blending of criminal and national security, whether it’s terrorists or state actors moonlighting as crooks or state actors using criminal groups as a way to distance themselves from the action, I think that is a trend that we saw increasing that’s just going to continue to increase over the next three to five years,” says John Carlin, now an attorney with Morrison & Foerster.To read this article in full or to leave a comment, please click here

Expert: Line between cyber crooks and cyber spies getting more blurry

Cybercriminals acting on behalf of national governments and nation-backed espionage agents carrying out cybercrimes for cash on the side is the future of security threats facing corporations and governments, says the former top U.S. attorney in charge of the Department of Justice’s national security division. Morrison & Foerster John Carlin “I think this blending of criminal and national security, whether it’s terrorists or state actors moonlighting as crooks or state actors using criminal groups as a way to distance themselves from the action, I think that is a trend that we saw increasing that’s just going to continue to increase over the next three to five years,” says John Carlin, now an attorney with Morrison & Foerster.To read this article in full or to leave a comment, please click here

Intel, McAfee dispute heads for settlement talks

A dispute between Intel and security expert John McAfee over the use of his name for another company is headed for settlement talks, according to court records.The move comes shortly after the federal court refused John McAfee and MGT Capital Investments, the company to be renamed, a preliminary injunction on Intel’s transfer of marks and related assets containing the word McAfee, as part of a proposed spin-out by the chipmaker of its security business as a separate company that would be called McAfee.The chip company said in September it had signed the agreement with TPG to set up a cybersecurity company in which Intel shareholders would hold 49 percent of the equity with the balance held by the investment firm.To read this article in full or to leave a comment, please click here

Intel, McAfee dispute heads for settlement talks

A dispute between Intel and security expert John McAfee over the use of his name for another company is headed for settlement talks, according to court records.The move comes shortly after the federal court refused John McAfee and MGT Capital Investments, the company to be renamed, a preliminary injunction on Intel’s transfer of marks and related assets containing the word McAfee, as part of a proposed spin-out by the chipmaker of its security business as a separate company that would be called McAfee.The chip company said in September it had signed the agreement with TPG to set up a cybersecurity company in which Intel shareholders would hold 49 percent of the equity with the balance held by the investment firm.To read this article in full or to leave a comment, please click here

Promoting digital accessibility: For persons with disabilities, with persons with disabilities

The United Nations estimates that one in six people (in Asia and the Pacific) live with disability – that is a total of 650 million people. Persons with Disabilities (PWDs) often face barriers that restrict them from participating in society on an equal basis, including the access to, and use of, information and communication technologies (ICTs).

Mr. Naveed Haq

How to watch the Grammy Awards on your iPhone or iPad

This Sunday, Feb. 12 will be a huge night for horror on TV: AMC's The Walking Dead returns at 9PM EST after its mid-season hiatus and the 59th Grammy Awards program in all its self-congratulatory glory kicks off at 8PM EST from Los Angeles. (Though I suppose last Sunday was an even bigger night of horror for those rooting against the New England Patriots in the Super Bowl...)Adele, Beyonce, Justin Bieber, Drake and Sturgill Simpson are all looking to win Record of the Year, while Chuck D, Jack White and Kelly Clarkson will be among performers during the Grammy show. Ample attention will no doubt be given as well to honoring the many famous musicians, such as Prince and David Bowie, who died last year. Late night talk show host and carpool karaoke crooner James Corden emcees the program.To read this article in full or to leave a comment, please click here

University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices

Today’s cautionary tale comes from Verizon’s sneak peek (pdf) of the 2017 Data Breach Digest scenario. It involves an unnamed university, seafood searches, and an IoT botnet; hackers were using the university’s own vending machines and other IoT devices to attack the university’s network.Since the university’s help desk had previously blown off student complaints about slow or inaccessible network connectivity, it was a mess by the time a senior member of the IT security team was notified. The incident is given from that team member’s perspective; he or she suspected something fishy after detecting a sudden big interest in seafood-related domains.To read this article in full or to leave a comment, please click here

University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices

Today’s cautionary tale comes from Verizon’s sneak peek (pdf) of the 2017 Data Breach Digest scenario. It involves an unnamed university, seafood searches, and an IoT botnet; hackers were using the university’s own vending machines and other IoT devices to attack the university’s network.Since the university’s help desk had previously blown off student complaints about slow or inaccessible network connectivity, it was a mess by the time a senior member of the IT security team was notified. The incident is given from that team member’s perspective; he or she suspected something fishy after detecting a sudden big interest in seafood-related domains.To read this article in full or to leave a comment, please click here