Search This Blog

Sunday, November 30, 2014

Amazon Echo: Fun, But Not Very Useful - Yet

How would you like to have your own administrative assistant to help you research information and compile simple lists?  All done hands-free by saying commands aloud?
And when you’re not assigning or asking things, how would you like an audio speaker that sounds good, so you can listen to music in the background as you work?


Amazon Echo: Fun, But Not Very Useful - Yet

Costco and Home Depot phishing emails target Cyber Monday shoppers

Costco and Home Depot phishing emails target Cyber Monday shoppers

Saturday, November 29, 2014

IBM News room - 2014-11-29 Thanksgiving Sets Historic Milestone as Mobile Drives More Than Half of All Shopping Traffic, Reports IBM Digital Analytics Benchmark - United States

Armonk, NY - 29 Nov 2014: IBM (NYSE: IBM) today reported record online and mobile shopping during Thanksgiving and Black Friday based on consumer transaction data analyzed in real-time by the IBM Digital Analytics Benchmark.  The data-driven insight gives retailers and marketers more than 370 performance indicators to benchmark themselves against industry peers to drive more targeted customer engagements. 



IBM News room - 2014-11-29 Thanksgiving Sets Historic Milestone as Mobile Drives More Than Half of All Shopping Traffic, Reports IBM Digital Analytics Benchmark - United States

Cisco Celebrates 20 years of Connecting Thailand and Digitizing the Economy | The Network

BANGKOK, Thailand, 28 November 2014 – Cisco, the worldwide leader in IT, celebrates 20 years of operations in Thailand, having played a key role in digitizing the economy and transforming Thailand. Cisco technologies, expertise and solutions have been embraced by business and organizations in, changing the way Thais' work, live, play and learn. For example, Cisco played a crucial role in building the first Internet PoPs (Points of Presence) with a commercial service provider, Internet Thailand Co. Ltd (now known as "Internet Thailand Public Company Limited or INET) which went "live" on 1st March, 1995.



Cisco Celebrates 20 years of Connecting Thailand and Digitizing the Economy | The Network

Cisco and Nottingham University Hospital transform the experience of Cystic Fibrosis sufferers

From Cisco:


PRESS RELEASE

Cisco and Nottingham University Hospital transform the experience of Cystic Fibrosis sufferers

In an initiative to improve the experiences of Cystic Fibrosis patients both during hospital stays and beyond, Nottingham University Hospital NHS Trust has announced a state of the art facility utilising technology from leading partners including Cisco.
George Jenkins OBE, Chairman of the Cystic Fibrosis Trust Trustees, said: "People with Cystic Fibrosis regularly spend weeks at a time in hospital meaning their units become a second home. The personalised service offered by this unit, such as dedicated chefs and gym pods in comfortable surroundings, will support people's wellbeing and make visits all the more relaxed, and provide the care that people need and deserve."
Utilising Cisco video technology, individual patient rooms are equipped with technology to not only enable high-quality video calling with family and friends, but virtual participation in group classes.  
Group participation wouldn't previously have been possible owing to the nature of the condition and the need for separation between patients, but the introduction of virtual sessions will enable patients to learn to manage the unique requirements of their condition, including hyper-metabolism that demands a diet in excess of 5,000 calories a day, and the need for very specific physiotherapy. 
"This remarkable facility is literally transforming the way in which we are caring for Cystic Fibrosis patients here in Nottingham. This occasion is a wonderful opportunity to say ‘thank you' to the many people who have made our dream of having such a first class facility become a reality, including patients, major charitable donors and of course our staff." explained  Dr Jane Dewar, Cystic Fibrosis Consultant.
"This is a fantastic and impactful example of technology enriching people's lives. What we are seeing here is the value of connectivity beyond just the technological, but between people. In this instance, connectivity and the ambition of Nottingham University Hospitals NHS Trust are transforming the lives of people with Cystic Fibrosis. I whole-heartedly applaud the efforts of those involved and am extremely proud to be supporting them in their efforts." added Terry Espiner, Client Director, Healthcare, Cisco UK & Ireland.
Additional information:
  • The solution deployed by Nottingham University Hospital includes a state of the art Cisco Video network, utilising touch-screen intuitive control and high-definition cameras.
  • The solution also makes use of the Cisco patented Speaker Track technology. This creates a far greater user experience as the camera dynamically changes viewing perspectives based on the individual speaking. 
  • The Gym pods make use of the Cisco DX80 range, providing the users with a unique, touch screen video enabled experience allowing them to communicate in a safe and friendly environment.
  • Cisco's Jabber Guest enables high-quality video calls from non-Cisco networks or devices with the simple click of a link.
  • The facility is supported by a Cisco local area network (LAN), wireless capability and Cisco security.

About Nottingham University Hospital
Nottingham University Hospitals NHS Trust is one of the biggest and busiest acute hospitals in England, employing 13,500 staff. We provide care to over 2.5million residents of Nottingham and its surrounding communities and specialist services to a further 3-4million people from neighbouring counties.
The Trust has three main sites:
  • Queen's Medical Centre (QMC) – our emergency care site, where our Emergency Department (A&E) major trauma centre and Nottingham Children's Hospital are located
  • Nottingham City Hospital – where our cancer centre, heart centre and stroke services are based, and where we focus on planned care and the care of patients with long-term conditions
  • Ropewalk House – where we provide a range of outpatient services, including hearing services
We have national and international reputations for specialist services such as stroke, renal, spinal, breast, neurosciences, cancer services and trauma.
The Trust has an annual income of £848million and approx 1,700 beds (87 wards).
We are at the forefront of many research programmes and new surgical procedures. Nottingham has Biomedical Research Units in Hearing and Digestive Diseases.
As a teaching trust we have a strong relationship with the University of Nottingham and other universities across the East Midlands, including Loughborough University – and we are part of the Olympic Legacy project. We play an important role in the education and training of doctors, nurses other healthcare professionals.
NUH is also leading the way in organ donation. You can support our ‘Be a Hero' campaign onwww.nuh.nhs.uk.
To find out more about our hospitals, please visit our website www.nuh.nhs.uk. You can also follow @nottmhospitals on Twitter.

About Cisco
Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. For ongoing news, please go to http://thenetwork.cisco.com.

League of Legends Bug Bounty Scheme has awarded over $100k

Riot Games has paid out over $100,000 to security researchers poring over the game looking for exploits, hacks and bugs, in its League of Legends bug bounty scheme, Security Week reports.
The HackOne platform, on which the League of Legends bug bounty program is based on has been open since April 2013, but only to a handful of security researchers. Despite this, since then they have found a total of 75 exploits which Riot Games has duly patched up.


League of Legends Bug Bounty Scheme has awarded over $100k

Healthcare security needs investment to stave off cyberattacks, says report

A new report from IDC Health Insights claims that healthcare security needs investment to ensure protection from an increasing threat of cyber attacks, according to the Computing website.
From the 2014 ICE Insights Cross Industry Cyber Theft Survey, in a section dealing with ‘Cyber Threats and Attacks Against Healthcare Organizations’, the group discovered that 39.4 percent of American healthcare organizations had been hit by more than 10 cyber attacks in the last year, with nearly a third (27.1 percent) of these marked as “successful”.


Healthcare security needs investment to stave off cyberattacks, says report

Infographic: Cyber Monday - Everything you need to know

Infographic: Cyber Monday - Everything you need to know

News websites hacked with 'Syrian Electronic Army' pop-up

A Thanksgiving attack across many Western news and information websites left visitors facing javascript pop-ups telling them they had been hacked by the Syrian Electronic Army, according to CNET.
A wide proportion of sites, including CNBC, the Canadian Broadcasting Corporation and the Boston Globe in North America, and The Telegraph, OK Magazine, Time Out in the UK were attacked via an exploit in the websites’ content delivery networks.


News websites hacked with 'Syrian Electronic Army' pop-up

Gamer PCs - how to keep yours clean and mean

Gamers have become major targets for hackers thanks to the lure of online accounts filled with credit card details and other ID – with dumps of millions of passwords and usernames from online gaming services becoming a regular occurrence.
With gaming now migrating almost entirely online, small-scale scams are blossoming, too – from duping people into opening infected screensaver files on the Steam marketplace, to selling ‘cheats’ poisoned with malware.


Gamer PCs - how to keep yours clean and mean

Facebook to strengthen its privacy policy

Facebook has announced a set of new privacy focused terms of service, which aims to let users of the social network ‘control their information’, according to The Independent.
The changes, which will be live as of 1 January 2015, introduce ‘Privacy Basics’, a tool that shows users who can see any information they share on the site, from links to photos tagged in. It will also include simple instructions on privacy issues, like removing your name from a photograph you’ve been tagged in.


Facebook to strengthen its privacy policy

Pirated website themes contain ‘CryptoPHP backdoor'

Pirate themes and plugins for websites running on WordPress, Drupal and Joomla contain  a nasty bit of malware that supports the attackers’ Search Engine Optimization efforts, CRN reports.
The malware in question is CryptoPHP – a script that allows remote attackers to execute code on web servers, and to have full control of the site. Rather than making itself obvious however, the malware is predominantly used for Black Hat Search Engine Optimization. PC World states that these underhand hand SEO tactics involve “injecting rogue keywords and pages into compromised sites to hijack their search engine rankings and push malicious content higher up in search results.” In this instance, the sites involved were casino and gambling websites.


Pirated website themes contain ‘CryptoPHP backdoor'

Friday, November 28, 2014

Australian government announces cybersecurity review

The Australian government is to conduct its first review into the country’s cybersecurity since 2008,ABC Australia reports.
Prime minister Tony Abbott made the announcement at the opening of the new Cyber Security Center in Canberra, where he stated that the first review in six years was due given the fast moving nature of cyber threats, saying, “in this area that is several lifetimes.”


Australian government announces cybersecurity review

Thursday, November 27, 2014

Cyber Monday - 12 tips to help you shop safely online

‘Cyber Monday’ is rapidly becoming a boom industry for cybercriminals, with reports of frauds having leapt 31% in 2013, according to police statistics quoted by The Guardian.
With social media helping to whip up the frenzy in the days ahead of the Black Friday and Cyber Monday sales – and retailers hyping bargains via Facebook, Twitter and email, it’s all too easy to click on the wrong link.


Cyber Monday - 12 tips to help you shop safely online

Bitcoin hack can reveal a user's IP address, says University of Luxembourg

The infamous anonymity of Bitcoin as a currency has a weakness built into it, according to a paper published by the University of Luxembourg.
The paper, entitled ‘Deanonymisation of clients in Bitcoin P2P network’, was written by Alex Biryukov, Dmitry Khovratovich and Ivan Pustogarov and explains how a determined hacker could reveal the IP address – and therefore the identity – of individuals who pay for transactions anonymously using the cryptocurrency.


Bitcoin hack can reveal a user's IP address, says University of Luxembourg

Security At Grandma’s House | Fortinet Blog

Even for companies that don’t normally allow users to work from home, the holidays practically beg for remote work...and plenty of security threats.



Security At Grandma’s House | Fortinet Blog

Wednesday, November 26, 2014

Do I need to worry about threats like Regin?

Since the discovery of Stuxnet several years ago, there has been a parade of targeted malware (such as Flame, Duqu, Gauss and now Regin) that may have been created or sponsored by nation states. These complex threats have a dizzying array of functionality designed, at least in part, to spy on its intended victims. Naturally, such exceptional threats garner much media coverage. But as an average person or business, is this something you need to worry about?
Generally speaking, unless you have state secrets or provide financial or Internet services to someone who does, it is not likely that you will run across such notable threats as Regin and company.


Do I need to worry about threats like Regin?

Sprint News - Week in Review: November 17 - 23 | Sprint Newsroom

Sprint News - Week in Review: November 17 - 23 | Sprint Newsroom

Google increases security with Devices and Activity Dashboard

Google has launched a couple of new security feature for user of its apps. Most strikingly, the Devices and Activity dashboard allows users to see all devices that have logged in to the user’s Google account, and from where, in the last 28 days, Mashable reports.
The Devices and Activity dashboard lists all computers, mobile phones and tablets which have logged into your Google account, along with a timestamp when they were ‘last seen’, and an approximate location. The description breaks down the mobile phones by handset type, but keeps computers to either Mac or Windows, with no indication as to whether the machine is a desktop or laptop machine.


Google increases security with Devices and Activity Dashboard

How Landing A Dream Job Led Me To My Dream Rig | NVIDIA Blog

Imagine, for a moment, what it’s like to work at NVIDIA.
If you picture gleaming piles of high-end graphics cards piled on desks, NVIDIA-powered cars parked outside, and adorable dogs stopping by to say hello, you aren’t far off from at least my own corner here.


How Landing A Dream Job Led Me To My Dream Rig | NVIDIA Blog

AGbot DDoS Attacks Internet VNC Servers | Fortinet Blog

AGbot DDoS Attacks Internet VNC Servers | Fortinet Blog

How to Claim a YouTube Custom Channel URL

How to Claim a YouTube Custom Channel URL

Tuesday, November 25, 2014

CNET Update - Conquer Black Friday by shopping online - YouTube

Video (2:56)



CNET Update - Conquer Black Friday by shopping online - YouTube

ESET to Launch Completely Re-designed, Best-of-Breed Business Security Suite

ESET®, a global pioneer in proactive internet security protection, today announced a significant transformation in its endpoint security products performance and usability. Building on the experience gained from more than 26 years of developing leading security solutions, ESET will introduce a completely re-designed suite of business security products for enterprise applications and small and medium-size businesses (SMBs) in North America later this year. 

Today, ESET protects more than 100 million endpoints and actively works with business customers on next-generation technology and threat mitigation strategies. While continuing to offer best-in-class speed and detection, the new ESET business products have been completely reengineered and redesigned to provide the most advanced and easily managed business protection available, thus increasing the strength of internet security and reducing the demands on internal IT resources. The latest offerings from ESET will include industry-leading protection for multiple endpoints, including file servers, email communication, mobile devices and more.



ESET to Launch Completely Re-designed, Best-of-Breed Business Security Suite

Craigslist hacked in DNS attack

Craigslist visitors were left surprised earlier this week, when browsing the popular classifieds website led them to some unexpected places, reports Gizmodo.
It appears a hacker made changes to the site’s DNS records on 23 November, redirecting visitors to a YouTube rap video, and the website of the video’s owner, DigitalGangster, which The Register reports was “used in 2008 to sell stolen celebrity photos.” The owner of the site and music video – a former hacker – denied any knowledge, stating that he had no idea who was behind the attacks.


Craigslist hacked in DNS attack

Could driverless cars be hacked? IET issues warning

Driverless cars are just around the corner, with the UK government putting up £10 million (around $15.6 million) for cities to pilot trials as soon as next year, but the country’s Institute of Engineering and Technology (IET) today issued stern warnings about the security of the technology.
Mashable reports that Hugh Boyes of the IET stated that software had to become more reliable and robust before the technology becomes mainstream.  He said, “Recent reports analyzing software show that 98 percent of applications have serious defects and in many cases there were 10-15 defects per application. If ultimately you want to use autonomous vehicles, we need to make sure they don’t have a defect.”


Could driverless cars be hacked? IET issues warning

5 Things You Need To Know About Regin | Fortinet Blog

Details are still emerging on the cyberespionage malware known as Regin, but it’s clear that this is no ordinary Trojan.



5 Things You Need To Know About Regin | Fortinet Blog

Machine Learning in the Ascendant

Last week, when I landed in New Orleans heading to the SC14 Supercomputing conference, my phone’s Google Now application told me about the local weather, and I searched for a good restaurant using voice commands in the taxi coming in.
Given where I was headed, it felt appropriate that these were running on some of the world’s largest supercomputers.  At the show itself, our booth’s mini-theater featured three days of talks by world-leading experts on supercomputers – and their use for weather and climate modeling, object recognition in images, and drug discovery.


Machine Learning in the Ascendant

Linear Technology PR: LTC2983 Universal Temperature Sensor IC Linearizes Temperature Sensors with 0.1°C Accuracy

MILPITAS, CA - November 24, 2014 - Linear Technology Corporation introduces the LTC2983 high performance digital temperature measurement IC which directly digitizes RTDs, thermocouples, thermistors and external diodes with 0.1°C accuracy and 0.001°C resolution. A high performance analog front end combines low noise and low offset buffered ADCs with all the necessary excitation and control circuits for each sensor. Measurements are performed under the control of a digital engine combining all the algorithms and linearization required for each. The LTC2983 provides a multiplexed high precision interface to virtually any sensor. It precisely measures absolute microvolt level signals from thermocouples and ratiometric resistance measurements from RTDs and thermistors, linearizes the results and outputs the results in °C or °F. Up to twenty analog inputs are available and digitized measurements can be output in Centigrade or Fahrenheit. The SPI interface works with virtually any digital system and a comprehensive software support system with drop-down menus allows easy customizing of the LTC2983.



Linear Technology PR: LTC2983 Universal Temperature Sensor IC Linearizes Temperature Sensors with 0.1°C Accuracy

Jolla Tablet Raises $380,000 in Just Over Two Hours

A device being touted as the “world’s first crowdfunded tablet” from Finnish company Jolla has surpassed its $380,000 goal in just over two hours. And the campaign for the tablet on Indiegogo has already raised more than $1 million.



Jolla Tablet Raises $380,000 in Just Over Two Hours

NVIDIA Foundation Awards $400,000 to Two Teams Pioneering Cancer Research

Our employee-led philanthropic arm is awarding $400,000 in grants to two teams of researchers who are using innovative computing methods to turn old ideas about cancer research inside out.
Each group will receive $200,000 from the NVIDIA Foundation for its work in using Big Data  to collect, analyze and distribute ever larger quantities of information in ways that are reshaping their investigative fields.


NVIDIA Foundation Awards $400,000 to Two Teams Pioneering Cancer Research

Brocade | Brocade Reports Fourth Quarter and Fiscal Year 2014 Earnings

Brocade | Brocade Reports Fourth Quarter and Fiscal Year 2014 Earnings

Monday, November 24, 2014

Salesforce Launches Desk.com App Hub to Integrate Partner Apps

Salesforce today launched the Desk.com App Hub. The company calls it a “one-stop shop to easily deploy partner apps that extend [the use of] Desk.com.”
Desk.com is Salesforce’s customer support application for small and midsize businesses. SMB businesses use Desk.com to manage customer support interactions coming over email and social channels. With Desk.com, businesses can set up FAQs and knowledge bases that their customers access via Facebook, websites, and mobile apps.


Salesforce Launches Desk.com App Hub to Integrate Partner Apps

NetSuite CFO Ron Gill to Present at the Barclays 2014 Global Technology Conference

SAN MATEO, Calif.—November 24, 2014—NetSuite Inc. (NYSE: N), the industry's leading provider of cloud-basedfinancials / ERP and omnichannel commerce software suites, today announced that NetSuite CFO Ron Gill will present at the Barclays 2014 Global Technology Conference at 11:40 a.m. PT on Wednesday, December 10, 2014 at The Palace Hotel in San Francisco, Calif.



NetSuite CFO Ron Gill to Present at the Barclays 2014 Global Technology Conference

Largest European Bioinformatics Center Selects Mellanox InfiniBand for High-Performance Supercomputer (NASDAQ:MLNX)

SUNNYVALE, Calif. & YOKNEAM, Israel--(BUSINESS WIRE)-- Mellanox® Technologies, Ltd. (NASDAQ:MLNX), a leading supplier of high-performance, end-to-end interconnect solutions, today announced the Center for Biological and Sequence Analysis (CBS) at the Risø Campus of Denmark Technical University (DTU) has selected Mellanox's end-to-end FDR 56Gb/s InfiniBand solution for the center's new supercomputer, making Denmark a global leader in bioinformatics. Mellanox's InfiniBand interconnect solution delivers the scalability, high performance and bandwidth needed for researchers around the world to share information and collaborate on the molecular analysis of people and their diseases to discover patterns and determine treatment methods.



Largest European Bioinformatics Center Selects Mellanox InfiniBand for High-Performance Supercomputer (NASDAQ:MLNX)

Virus Bulletin and AVAR conference papers from ESET

As 2014 draws to a close, so does the security conference season, for the moment. However, a conference paper is for life, not just Christmas. (Well, I try to keep all mine available, even though some of the earlier ones are mostly only of historical interest.)
Since the Virus Bulletin conference in September, Martijn Grooten has published a series of blogs about papers from the conference that have been made available on the VB site, including a paper by Jean-Ian Boutin in which he discusses the commoditization of web injects, and a paper by Eugene Rodionov, Aleksandr Matrosov and myself on the continuing evolution of bootkits.


Virus Bulletin and AVAR conference papers from ESET

Smart home security

Smart home security has hit the headlines over the past few days, after a Russian website offered apotent reminder of the dangers of devices which connect directly to the internet.
The reminder came in the form of live feeds from unsecured ‘Smart’ CCTV cameras showing homes, businesses and nurseries around the world.


Smart home security

The end for password authentication

Recent events have yet again called into question the effectiveness of the password as a security measure and have us asking once more, ‘is this the end for passwords?’ as serious question marks over the safety of our data are raised once again.
Many analysts believe simply that password authentication systems have reached a state of obsolescence. However, the issue remains:  despite the vulnerability of password systems, they are still the number one verification method used to validate the identity of users.


The end for password authentication

Can e-cigarettes give you malware?

The long-term health effects of electronic cigarettes – or E-cigarettes – are still open for discussion – but the devices could harm your computer, at least if one report is to be believed.
The Guardian reports that the devices, which charge via USB ports, either on a wall socket or plugged direclty into a PC, can reportedly carry an unwanted payload of malware, at least according to one Reddit poster.


Can e-cigarettes give you malware?

Sprint and Sun Coast Make Insurance Officially Cool | Sprint Newsroom

Sun Coast General Insurance is showing just how cool a traditional industry can be, using advanced M2M technology to re-invent what auto insurance can do for policyholders and agents.



Sprint and Sun Coast Make Insurance Officially Cool | Sprint Newsroom

Sunday, November 23, 2014

GoPro’s Andrew Shipp: Create Amazing Social Media Content -- Now

Andrew Shipp loves to talk about social media content. As social media manager for GoPro, he’s got a lot to share. GoPro’s creative, versatile and robust approach to social media engagement offers a tantalizing view of what can be accomplished when a ferocious social media strategy leverages timely shares, visual content and a cross-platform energy.
Take a look at GoPro’s social creativity — and engagement.  GoPro on Facebookand Twitter are just two platform examples. What can you learn from GoPro’s social media mastermind when it comes to getting creative with your social media engagement strategies? Shipp is all too happy to share.


GoPro’s Andrew Shipp: Create Amazing Social Media Content -- Now

Friday, November 21, 2014

Week in Security: Grief for gamers, Unicorn spotted - and America wakes up

Cybercriminals once again had gamers in their crosshairs this week – with one self-proclaimed hacking group dumping what appeared to be the first installment of logins purloined from gaming networks online, and Steam gamers falling victim to scams when trading in-game goods.
There was good news, though, in the form of upgraded security for WhatsApp, and a new awareness among the public that privacy is important. 


Week in Security: Grief for gamers, Unicorn spotted - and America wakes up

Facebook scams - ‘Naked woman eaten by shark’ is latest bait

Malware evolves and social networks change – but some cybercriminal tricks remain the same, especially in the realm of Facebook scams.
The latest salacious video – promising ‘Naked Woman Eaten by a Shark’ – is just one in a long chain of viral video scams spread via Faceboook, according to IB Times.


Facebook scams - ‘Naked woman eaten by shark’ is latest bait

Inside Job: New Generation of Digital Interiors Steal LA Auto Show | NVIDIA Blog

Flashy colors. Sharp curves. Exotic materials. Want to make news at a car show? Up until recently, it involved unveiling a design with radical sheet metal and letting the camera bulbs flash away.
Well, something new is happening at this year’s 2014 Los Angeles Auto Show.


Inside Job: New Generation of Digital Interiors Steal LA Auto Show | NVIDIA Blog

Sprint offers tips for safer mobile holiday shopping | Sprint Newsroom

It’s a great time to be a consumer. It would be difficult to find a major retailer that doesn’t offer e-commerce on its website and more retail apps are hitting the market all the time.

That’s why nearly 150 million Americans will use their mobile phones to make a purchase this year, and that number is only growing. In fact, mobile commerce will grow more than 37 percent in 2014 according to eMarketer, which compiles data from 120 sources that track commerce.



Sprint offers tips for safer mobile holiday shopping | Sprint Newsroom

Study shows how subjects respond to security warnings... and being 'hacked'

Stark security warnings are routinely ignored, according to a new study by Brigham Young University, which also cast interesting insight in what people’s reactions are when they realize their computer has been compromised, according to News Room America.
Researchers Anthony Vance, Bonnie Anderson and Brock Kirwan, carried out the experiment to assess people’s attitude to online risk, and how they behave when presented with dangerous scenarios. Subjects were initially asked to quantify how they felt about online security, but this was followed up by a ‘seemingly unrelated task’ where participants were required to login to a website on their own computers to categorize pictures of Batman as either photographed or animated.


Study shows how subjects respond to security warnings... and being 'hacked'

DerpTrolling leaks 5,604 logins for PSN, 2K and Windows Live

Hacking group DerpTrolling has leaked 5,604 logins for three gaming networks to Pastebin, and claims that this is a “very small portion” of the credentials they have stolen, LifeHacker reports.
The leak was announced by the one of the hacking group to his 40,900 followers today with a seemingly innocuous comment:”We will just leave this here.” A Pastebin link with over 5,500 login credentials followed.


DerpTrolling leaks 5,604 logins for PSN, 2K and Windows Live

Is Free WiFi in Greece Going to be a Trend Setter?

Free WiFi might not always be the safest things that you can have. It has been found that it might lead to dangers associated with cybercrime. Yet, it is a thing that almost every person wants in this age of information and technology.
However, in most places, WiFi is still quite costly. Even when you speak about free WiFi, it’s primarily for the major cities of a country, although not all of them. So while free WiFi in all villages, cities and towns in a country still sounds a bit unreal, it’s turning into a reality. And it’s happening in the European country of Greece.


Is Free WiFi in Greece Going to be a Trend Setter?

Business Apps for Wearable Tech Are Coming

Look around and you’re seeing more people walking around with things like Fitbits, Samsung Gears, and other devices wrapped around their wrists. And if the adoption of iPhones and iPads are any indicator, you have to wonder how wearable technology adoption will accelerate when Apple’s hotly anticipated watch becomes available early next year.



Business Apps for Wearable Tech Are Coming

More than half of British firms 'would consider hiring hackers'

More than half of British firms would consider hiring computer hackers in the face of a severe skills shortage – and more than 50% of executives said that they would consider hiring an expert even if they had a criminal record, according to Computer Weekly.
The poll was conducted by professional services firm KPMG and found that hiring managers were facing stark choices when it came to skilled IT staff – and thus considering the risky choice of hiring former hackers.


More than half of British firms 'would consider hiring hackers'

Security Digest: November 20th | Fortinet Blog

Security Digest: November 20th | Fortinet Blog

Dell’s End-to-End Solutions Help Fuel Airlines Industry Success | Dell

Dell’s End-to-End Solutions Help Fuel Airlines Industry Success | Dell

Dell to Announce Fiscal 2015 Q3 Financial Results December 4 | Dell

Dell to Announce Fiscal 2015 Q3 Financial Results December 4 | Dell

Thursday, November 20, 2014

#GoldFridaySweeps - Tweet to Win LG G3! | Sprint Newsroom

#GoldFridaySweeps - Tweet to Win LG G3! | Sprint Newsroom

Dell Venue 11 Pro 7000 Returns With Better Chip

Dell has re-introduced the Venue 11 Pro 7000 tablet but this time with a new processor that offers a more mainstream performance but with the lower power level required of a tablet.
Intel has just released the Core M processor, part of its Broadwell series of processors generally used for laptops and laptop/tablet hybrids. But this is a different kind of processor, reports CNET.


Dell Venue 11 Pro 7000 Returns With Better Chip

Wireless attacks against 'air gapped' targets are possible, Israeli team claims

A team of Israeli researchers has demonstrated a way to hack into an ultra-secure air gapped network, install malware, and retreive information – without adding hardware to the network, according to Bloomberg News.
‘Air gaps’ – purposely leaving a machine without a connection to the internet – have been considered the last bastion of PC security, and the technique is commonly used in military or governmental establishments.


Wireless attacks against 'air gapped' targets are possible, Israeli team claims

Supercomputing at the Edge Takes Wing at Supercomputing Show | NVIDIA Blog

There’s nothing remotely like it at the SC14 supercomputing show in New Orleans.
A supercomputer the size of a window air-conditioning unit, it glows an otherworldly orange. And it points the way to the future of supercomputing at the edge of the network, that is, the point where data gets generated.


Supercomputing at the Edge Takes Wing at Supercomputing Show | NVIDIA Blog

Footage from thousands of home webcams found streaming on Russian site

A Russian website is showing off hundreds of feeds of live webcam footage from inside homes and businesses, which have been accessed by hacking into people’s webcams, CCTV systems and monitors, according to The Independent.
Footage on show includes nurseries, the interior of gyms, and private homes – and thousands of cameras are streaming live on the Russian-hosted website.


Footage from thousands of home webcams found streaming on Russian site

iPad Users Get Refund on Office 365

Some iPad users may be in line for a refund from Microsoft, of all places. Microsoft recently changed its pay structure on its mobile Office app. The company had previously required an annual subscription to Office 365 from iPad users who wanted to do any editing or other work within Office using a special iPad Office app.
But now, Microsoft is allowing Office users on iPads and most other mobile devices to edit and work in Word documents and other parts of the Office via mobile app for free.


iPad Users Get Refund on Office 365

Nearly One-third of Deloitte 2014 Technology Fast 500 in Seattle and Silicon Valley Run NetSuite

SAN MATEO, Calif.—November 20, 2014—NetSuite Inc. (NYSE: N), the industry's leading provider of cloud-based financials / ERP and omnichannel commerce software suites, today announced that 31 percent of companies on the Deloitte Technology Fast 500 list for 2014 in the fast-growing Silicon Valley and Seattle markets run NetSuite to drive innovation, business efficiency, agility and scalability. Now in its 20th year, the Deloitte Technology Fast 500 ranks the fastest-growing technology, media, telecommunications, life sciences, and clean technology companies in North America based on percentage of fiscal year revenue growth over the past four years.



Nearly One-third of Deloitte 2014 Technology Fast 500 in Seattle and Silicon Valley Run NetSuite

Unicorn bug first exploit 'in the wild'

Microsoft released a patch last week for a critical vulnerability allowing remote code execution in Internet Explorer. This vulnerability, known as CVE-2014-6332, and discovered by an IBM X-Force security researcher, is significant because it exploits an old bug present in Internet Explorer versions 3 through 11. This means that most, if not all, Internet Explorer users are vulnerable unless they are using patched systems. It gets worse: the vulnerability not only can be used by an attacker to run arbitrary code on a remote machine, but it can also bypass the Enhanced Protected Mode (EPM) sandbox in IE11 as well as Microsoft’s free anti-exploitation tool, the Enhanced Mitigation Experience Toolkit (EMET).



Unicorn bug first exploit 'in the wild'

Brocade | ESG Lab Achieves Impressive Testing Results for Enterprise-Ready VDI Solution Based on EMC VSPEX Proven Infrastructure and Brocade Networking

New Report Validates High Performance, Massive Scalability, and Ease of Deployment for 3,500 Virtual Desktops Using EMC XtremIO All-Flash Storage and Brocade Gen 5 Fibre Channel SAN and Brocade VDX Ethernet Fabric Networks



Brocade | ESG Lab Achieves Impressive Testing Results for Enterprise-Ready VDI Solution Based on EMC VSPEX Proven Infrastructure and Brocade Networking

Russian website streams thousands of private webcams - Nov. 20, 2014

A new website based in Russia is streaming video live from thousands of private webcams around the world, including images of babies and hospital patients.

Hackers accessed the cameras by using default passwords set by the manufacturers, British officials said Thursday. Those log-in details are freely available online, leaving the unsecured cameras accessible to anyone.


Russian website streams thousands of private webcams - Nov. 20, 2014

7 Hot Trends Defining Your 2015 Content Strategy

Content marketing is an essential component in buyer engagement, social media, lead generation and online marketing. In fact, the power your content carries is growing by the day as new tactics and trends propel content development to new heights in brand publishing.
Blogging is not enough. Social media is not enough. There is a methodology that makes up smart content creation and it focuses on attracting, converting and inspiring your target audience — your clients and potential clients. Content needs to engage, inform and delight in order to build market identity, brand ambassadors and new opportunities for business growth and development.


7 Hot Trends Defining Your 2015 Content Strategy

Garmin® Expands G950™ Flight Deck Upgrade Program » Garmin News Releases

OLATHE, Kan. /November 20, 2014/Business Wire — Garmin International Inc., a unit of Garmin Ltd. (NASDAQ: GRMN), today announced the addition of supplemental type certificate (STC) approval of the G950 Integrated Flight Deck (IFD) in the Metroliner and Twin Otter aircraft, expanding our G950 portfolio to six aircraft models. The G950 solves avionics obsolescence, meets regulatory requirements, improves dispatch reliability and expands the operational life and capabilities of these venerable aircraft.



Garmin® Expands G950™ Flight Deck Upgrade Program » Garmin News Releases

Districts Nationwide Choose Dell Chrome-based Learning Solutions for Common Core Testing and Advanced Academics | Dell

Today Dell announced schools across the nation are adopting the Dell Chromebook 11 to support Common Core online assessments, individualize lesson plans and increase student and teacher access to technology. Building on Dell’s end-to-end education technology portfolio, the Chromebook 11 provides schools with an affordable solution that is secure, easy to deploy and manage and more reliable than competing Chromebook devices. This maximizes school districts’ IT investments while creating the innovative, personalized learning environment students need to develop critical-thinking skills for future success.



Districts Nationwide Choose Dell Chrome-based Learning Solutions for Common Core Testing and Advanced Academics | Dell

Wednesday, November 19, 2014

KLA-Tencor Announces Upcoming Investor Presentation (NASDAQ:KLAC)

MILPITAS, Calif.Nov. 19, 2014 /PRNewswire/ -- KLA-Tencor Corporation (NASDAQ: KLAC), the world's leading supplier of process control and yield management solutions for the semiconductor and related nanoelectronics industries, today announced that a live audio webcast of the following company presentation will be available as described below:



KLA-Tencor Announces Upcoming Investor Presentation (NASDAQ:KLAC)

Wix and Bigstock Offer Hi-Res Stock Photography

A partnership between a growing website design platform a large stock photography provider is aimed at giving small businesses better content for their websites.
It’s imperative today that any business website pop with eye-catching imagery. But those photos and graphics can sometimes cost a pretty penny.


Wix and Bigstock Offer Hi-Res Stock Photography

WhatsApp gets tough on security

Hugely popular messaging service WhatsApp has just, in one fell swoop, become one of – if not the – most secure consumer messaging service in the world, thanks to its adoption of end-to-end encryption.
In what represents the largest rollout of this level of encryption in any messaging system worldwide, according to the BBC, WhatsApp integrated Open Whisper Systems’ TextSecure software – which will be turned on by default for Android users – with WhatsApp’s iOS consumers to follow suit. Although in an Open Whisper blog post, the suggestion was that the team still ‘have a ways to go until all mobile platforms are fully supported, but we are moving quickly towards a world where all WhatsApp users will get end-to-end encryption by default.”


WhatsApp gets tough on security

Web Design Tips for Beginners to Drive Traffic to Your Site

These days, your business needs an online presence. It is an important component in the process of marketing your business to an online audience. The primary objective when building a website is to market your products and services. And for that, it is essential to ensure a maximum number of people visit your website.
The design of a website plays an important role in building a committed audience.You can go for an SEO-friendly Web design to make your website rank high in search engine results. Or, you can just follow a few tips on Web design to increase visits to your website to generate maximum leads and revenue. So how do you get the maximum amount of visitors to your website? Here’s a quick look at some Web design tips for beginners.


Web Design Tips for Beginners to Drive Traffic to Your Site

Getting Serial on an IP Camera | Fortinet Blog

I recently found myself requiring to downgrade the firmware on the lab's in-house IP camera.

Attempts at trying to do so using the 'Upgrade Device Firmware' utility from the UI (pictured below) failed. 
(Might sound counterintuitive, but it was also the obvious thing to try). 



Getting Serial on an IP Camera | Fortinet Blog

Star Power: Modeling the Formation of the Milky Way | NVIDIA Blog

Simulating the formation of an entire galaxy is no easy task. It takes precise calculations and massive amounts of computational horsepower.
It’s even harder to run a simulation of this size while simultaneously rendering the results interactively  on the same system.


Star Power: Modeling the Formation of the Milky Way | NVIDIA Blog

Mellanox Introduces Programmable Network Adapter Product Line with Application Acceleration Engine (NASDAQ:MLNX)

NEW ORLEANS--(BUSINESS WIRE)-- SC'14 - Mellanox® Technologies, Ltd. (NASDAQ: MLNX), a leading supplier of high-performance, end-to-end interconnect solutions for data center servers and storage systems, today announced the Programmable ConnectX®-3 Pro adapter card with Virtual Protocol Interconnect® (VPI) technology. 

Modern data centers, public and private clouds, Web 2.0 infrastructures, telecommunication, and high-performance computing require to achieve the highest performance and maximum flexibility. With an on-board integrated FPGA and memory, Mellanox's programmable adapter provides maximum flexibility for users to bring their own customized applications such as IPSEC encryption, enhanced flow steering and Network Address Translation (NAT), overlay networks bridge or router, data inspection, data compression or deduplication offloads, and others.



Mellanox Introduces Programmable Network Adapter Product Line with Application Acceleration Engine (NASDAQ:MLNX)

Tuesday, November 18, 2014

NVIDIA and Audi Speeding Up the Pace of In-Car Technology | NVIDIA Blog

At the Los Angeles Auto Show’s Connected Car Expo Tuesday, NVIDIA and Audi showcased the latest innovations developed out of our partnership to deliver the auto industry’s most advanced in-car technologies.
In its North American debut, the all-new Audi TT introduces the virtual cockpit. It’s an entirely digital instrument cluster that drivers can customize to present the information they want most.


NVIDIA and Audi Speeding Up the Pace of In-Car Technology | NVIDIA Blog

Tesla K80 Is All About Instant Gratification | NVIDIA Blog

Why wait for tomorrow to get results when you can have them today? Why do just one job a day when our new Tesla K80 can run twice that number?
We’ve given researchers with some of the most demanding jobs around early access to the Tesla K80 dual-GPU accelerator.
Here’s what they’re telling us: Tesla K80 is shrinking the time to discovery and insights in high performance computing (HPC). Waiting for CPUs and other accelerators slows the pace of innovation when you can discover solutions on the Tesla K80 sooner than before.


Tesla K80 Is All About Instant Gratification | NVIDIA Blog

U.S. State Department shuts down entire email system after suspected attack

The U.S. State Department has shut down its entire unclassified email system after a suspected intrusion – and technicians are now working to beef up email security systems, according to theAssociated Press.
There is no evidence that classified email systems were accessed, according to The Guardian’sreport.


U.S. State Department shuts down entire email system after suspected attack