Blog

The 10 most powerful supercomputers on Earth

Posted by:

Come on We Know You Want to SHARE
The biggest supercomputers out there
fastest supercomputers 2015 1

The twice-yearly top500 listing of the world’s most powerful supercomputers is out, and even if there are few surprises, the presence of a brand-new system on the top 10 is intriguing. Here’s your illustrated list of the 10 mightiest computing machines on the planet, as of June 2015.

To read this article in full or to leave a comment, please click here

Continue Reading →
0

How to disable Flash Player: Why now’s a better time than ever

Posted by:

Come on We Know You Want to SHARE

Now more than ever, leaving Adobe Flash Player on your system is looking like a dubious proposition.

While Flash has long been a popular vector for malware, last week’s security breach of surveillance software firm Hacking Team underscored just how vulnerable Flash can be. Hacking Team was relying on at least three unpatched Flash exploits, which cybercriminals immediately adapted for their own nefarious uses. Adobe is scrambling to patch the exploits, but at least one remains unfixed as of this writing.

To read this article in full or to leave a comment, please click here

Continue Reading →
0

DEF CON: Come hack the Internet of Things

Posted by:

Come on We Know You Want to SHARE

The Internet of Things is talked about a lot and many people are unsure what it really is, but at DEF CON 23 this summer in Las Vegas, that should become a lot more clear as attendees compete to hack IoT devices.

“Pwning IoT via Hardware Attacks” is a competition starting this year as part of IoT Village, a new sector of the conference focusing on security of proliferating device such as sensors, meters, industrial controls and smart appliances.

As part of the village attendees can enter their successful compromises against IoT devices in an attempt to win prizes. The entries will be judged on the severity of the compromise – how thoroughly a machine is taken over – and how it can be accessed, such as remotely or without being detectable, says Chase Schultz, a security researcher for Independent Security Evaluators (ISE), which is organizing the competition.

To read this article in full or to leave a comment, please click here

Continue Reading →
0

Pivot Networks Can Help Migration Away from Windows Server 2003

Posted by:

Come on We Know You Want to SHARE

Perhaps you have heard that support for all versions of Windows Server 2003, Windows Server 2003 R2 and Small Business Server 2003 R2 will end on July 14, 2015. This means that very soon security patches, hotfixes, and complimentary support will not be available. Also, PCI (Payment Card Industry) policies will no longer be met.
If your PCI goes down, you might not be able to safely take credit cards or handle online payments anymore. Many companies depend on secure …

Continue Reading →
0

Best Smartphone Apps for 2014

Posted by:

Come on We Know You Want to SHARE

There are so many smartphone apps out there that it’s common to have trouble figuring out which ones are worthwhile. If you want some help weeding out the good from the bad, CIO.com app reviewer James A Martin has some tips for you. In his recent review of fall 2014 apps, he takes a look 6 different applications.
First, the bad: He’s disappointed in Gmail’s much-hyped Inbox app for Android, iOS and Chrome, the investment app, Acorns Android and the …

Continue Reading →
0

Employee-Sourced Tools are Changing Corporate Collaboration

Posted by:

Come on We Know You Want to SHARE

In a mobile-based world, individuals are doing more to change the game of business collaboration and content sharing. When companies are still using outdated or problematic programs for web conferencing or presentations, employees are showing they have little hesitation in bringing their own mobile devices and tools to the table.
According to a study called “Collaboration 2.0: Death of the Web Conference (As We Know It),” employees are spending more time in meetings than ever before–91% say this–but not getting …

Continue Reading →
0

Heartbleed Flaw Not a Conspiracy

Posted by:

Come on We Know You Want to SHARE

New research has shown that the “Heartbleed” flaw probably wasn’t known of before it was made public.
These findings lay to rest conspiracy theories that US government agencies had played a part and that they had been using the weakness for surveillance purposes.
The paper, published by researchers from various universities, showed that attacks using the vulnerability exposed by Heartbleed didn’t take place till after it had been announced.
Over 700 sources used the information to then attack computers with …

Continue Reading →
0
Page 22 of 22 «...101819202122

# #