U.S. court rules that FBI can hack into a computer without a warrant

A U.S. court has ruled that the FBI can hack into a computer without a warrant -- a move which is troubling privacy advocates.The criminal case involves a child pornography site, Playpen, that had been accessible through Tor, a browser designed for anonymous web surfing.The FBI, however, managed to take over the site in 2014, and then tracked down and arrested its members by hacking their computers. This allowed law enforcement to secretly collect their IP addresses.To read this article in full or to leave a comment, please click here

US court rules that FBI can hack into a computer without a warrant

A U.S. court has ruled that the FBI can hack into a computer without a warrant -- a move which is troubling privacy advocates. The criminal case involves a child pornography site, Playpen, that had been accessible through Tor, a browser designed for anonymous web surfing. The FBI, however, managed to take over the site in 2014, and then tracked down and arrested its members by hacking their computers. This allowed law enforcement to secretly collect their IP addresses.To read this article in full or to leave a comment, please click here

US court rules that FBI can hack into a computer without a warrant

A U.S. court has ruled that the FBI can hack into a computer without a warrant -- a move which is troubling privacy advocates. The criminal case involves a child pornography site, Playpen, that had been accessible through Tor, a browser designed for anonymous web surfing. The FBI, however, managed to take over the site in 2014, and then tracked down and arrested its members by hacking their computers. This allowed law enforcement to secretly collect their IP addresses.To read this article in full or to leave a comment, please click here

Arista infringes on Cisco networking patents, trade agency says

In a move that could lead to a ban on selling its products in the United States, the US International Trade Commission has ruled that Arista does in fact infringe on a number of Cisco’s technology patents.Arista now must decide if it wants to ask the US government to overturn a so-called “import ban” or ask that an appeals court toss the decision, observers say. It could also decide to build products in the US – a move that Cisco says would “not only would violate the ITC orders, but the federal court has the authority to enjoin local manufacturing of infringing products.”To read this article in full or to leave a comment, please click here

Arista infringes on Cisco networking patents, trade agency says

In a move that could lead to a ban on selling its products in the United States, the US International Trade Commission has ruled that Arista does in fact infringe on a number of Cisco’s technology patents.Arista now must decide if it wants to ask the US government to overturn a so-called “import ban” or ask that an appeals court toss the decision, observers say. It could also decide to build products in the US – a move that Cisco says would “not only would violate the ITC orders, but the federal court has the authority to enjoin local manufacturing of infringing products.”To read this article in full or to leave a comment, please click here

Arista infringes on Cisco networking patents, trade agency says

In a move that could lead to a ban on selling its products in the United States, the US International Trade Commission has ruled that Arista does in fact infringe on a number of Cisco’s technology patents.Arista now must decide if it wants to ask the US government to overturn the so-called “import ban” or ask that an appeals court toss the decision, observers say. It could also decide to build products in the US – a move that Cisco says would “not only would violate the ITC orders, but the federal court has the authority to enjoin local manufacturing of infringing products.”To read this article in full or to leave a comment, please click here

Arista infringes on Cisco networking patents, trade agency says

In a move that could lead to a ban on selling its products in the United States, the US International Trade Commission has ruled that Arista does in fact infringe on a number of Cisco’s technology patents.Arista now must decide if it wants to ask the US government to overturn the so-called “import ban” or ask that an appeals court toss the decision, observers say. It could also decide to build products in the US – a move that Cisco says would “not only would violate the ITC orders, but the federal court has the authority to enjoin local manufacturing of infringing products.”To read this article in full or to leave a comment, please click here

DARPA is looking to make huge strides in machine learning

The U.S. Defense Department's research and development arm is offering to fund projects that will simplify the massively complex task of building models for machine learning applications.Models are a fundamental part of machine learning. Similar to algorithms, they help teach computers to, say, identify a cat in a photo, forecast weather from historical data or sort spam from legitimate email.But writing the models takes time and requires many skills. Typically, data scientists, subject matter experts and software engineers all have to come together to develop the model.When New York University researchers wanted to model block-by-block traffic flow data for the city, it took 60 person-months of work by data scientists to prepare the data for use and an additional 30 person-months to develop the model.To read this article in full or to leave a comment, please click here

Slideshow: Check out the sensors that make IoT click

Slideshow: Check out the sensors that make IoT clickImage by Stephen LawsonSensors are at the heart of the Internet of Things, collecting the data that powers wearables and smart cities alike. This week in San Jose, makers of sensors and related gear gathered for the Sensors Expo & Conference. Here's a look at some of these components.To read this article in full or to leave a comment, please click here

iPhone 7 won’t include game-changing features, report claims

With WWDC now behind us, the next big event on Apple's schedule is its highly anticipated iPhone 7 unveiling. Likely to take place sometime this coming September, the iPhone 7 will be under a lot of pressure to boost sales. Of course, iPhone sales are still incredibly strong, but Apple in 2016 experienced its first year over year drop in iPhone sales in history. In other words, analysts and pundits will be looking at the iPhone 7 to deliver in a big way.That said, a recent report from The Wall Street Journal suggests that the iPhone 7 may not include any game-changing features. Specifically, the report relays that Apple's traditional schedule of implementing major design changes to the iPhone every two years will be adjusted ever so slightly.To read this article in full or to leave a comment, please click here

Let’s Encrypt accuses Comodo of trying to swipe its brand

Let’s Encrypt, a free certificate authority launched by the Internet Security Research Group in November 2014 and backed by some of the biggest names in the industry, today revealed that rival CA Comodo is attempting to “improperly” trademark the Let’s Encrypt brand.And it’s difficult to see how that isn’t the case.From a blog post by ISRG executive director Josh Aas: Some months ago, it came to our attention that Comodo Group, Inc., is attempting to register at least three trademarks for the term “Let’s Encrypt,” for a variety of CA-related services. These trademark applications were filed long after the Internet Security Research Group (ISRG) started using the name Let’s Encrypt publicly in November of 2014, and despite the fact Comodo’s “intent to use” trademark filings acknowledge that it has never used “Let’s Encrypt” as a brand.To read this article in full or to leave a comment, please click here

Let’s Encrypt accuses Comodo of trying to swipe its brand

Let’s Encrypt, a free certificate authority launched by the Internet Security Research Group in November 2014 and backed by some of the biggest names in the industry, today revealed that rival CA Comodo is attempting to “improperly” trademark the Let’s Encrypt brand.And it’s difficult to see how that isn’t the case.From a blog post by ISRG executive director Josh Aas: Some months ago, it came to our attention that Comodo Group, Inc., is attempting to register at least three trademarks for the term “Let’s Encrypt,” for a variety of CA-related services. These trademark applications were filed long after the Internet Security Research Group (ISRG) started using the name Let’s Encrypt publicly in November of 2014, and despite the fact Comodo’s “intent to use” trademark filings acknowledge that it has never used “Let’s Encrypt” as a brand.To read this article in full or to leave a comment, please click here

Let’s Encrypt accuses Comodo of trying to swipe its brand

Let’s Encrypt, a free certificate authority launched by the Internet Security Research Group in November 2014 and backed by some of the biggest names in the industry, today revealed that rival CA Comodo is attempting to “improperly” trademark the Let’s Encrypt brand.And it’s difficult to see how that isn’t the case.From a blog post by ISRG executive director Josh Aas: Some months ago, it came to our attention that Comodo Group, Inc., is attempting to register at least three trademarks for the term “Let’s Encrypt,” for a variety of CA-related services. These trademark applications were filed long after the Internet Security Research Group (ISRG) started using the name Let’s Encrypt publicly in November of 2014, and despite the fact Comodo’s “intent to use” trademark filings acknowledge that it has never used “Let’s Encrypt” as a brand.To read this article in full or to leave a comment, please click here

DockerCon 2016: Just Wow!

The Docker Community has continued to impress us with so much awesomeness packed in just a few days at DockerCon 2016!

Big thank you to all of the 141 confirmed speakers (not including Open Forum track sessions!), 100+ sponsors and over 4,000 attendees for helping us make such a big splash in Seattle.

We’ll post the recorded videos and slides soon starting with the general sessions but here is a brief recap of all of the news DockerCon 2016!
Continue reading

Why Russian hackers, not a lone wolf, were likely behind the DNC breach

Proving who pulled off a cyber attack is never easy and sometimes impossible. That’s the reality investigators face as they try to figure out who breached the network of the Democratic National Committee, which revealed last week that hackers had made off with confidential documents including research on Republican presidential opponent Donald Trump.Russia was fingered as the likely suspect, until a hacker calling himself Guccifer 2.0 stepped up and claimed that he acted alone. But despite what appear to be DNC documents posted by Guccifer online, some security experts remain convinced that a group of skilled Russian hackers was behind the attack - likely acting on behalf of the Russian government. Here's why they think that:To read this article in full or to leave a comment, please click here

Why Russian hackers, not a lone wolf, were likely behind the DNC breach

Proving who pulled off a cyber attack is never easy and sometimes impossible. That’s the reality investigators face as they try to figure out who breached the network of the Democratic National Committee, which revealed last week that hackers had made off with confidential documents including research on Republican presidential opponent Donald Trump.Russia was fingered as the likely suspect, until a hacker calling himself Guccifer 2.0 stepped up and claimed that he acted alone. But despite what appear to be DNC documents posted by Guccifer online, some security experts remain convinced that a group of skilled Russian hackers was behind the attack - likely acting on behalf of the Russian government. Here's why they think that:To read this article in full or to leave a comment, please click here