Digital immortality: How to create an eternal copy of yourself
The world around us is changing rapidly, from a prehistoric physical environment 50,000 years ago to a digital world of the future, signs of which are here with us today.
As a result, many aspects of our lives are becoming increasingly digital, and soon virtually everything in our business and personal lives will be represented by ones and zeros, bits and bytes. The digital world is no longer a fantasy, it is reality.
Kaspersky declares war on Lazarus hacking group
Oooohhh, things are about to get really interesting in the cyber-security world. Kaspersky Lab has just declared war on the infamous hacking collective Lazarus Group, and it’s bringing its friends to the fight.
Together with Novetta and "other industry partners", Kaspersky Lab has announced the formation of Operation Blockbuster targeted at disrupting the activity of the Lazarus Group.
Spotify moves to Google's cloud
Swedish music streaming service Spotify has decided to transport its entire product onto Google’s cloud. The news was confirmed on the Spotify blog.
In the blog post, written by the company's vice-president of engineering and infrastructure, Nicholas Harteau, it was explained how Spotify decided for the move as it could no longer scale fast enough to meet the demand.
MWC 2016: The most important products announced so far
We are just past the half way point at Mobile World Congress 2016, which has so far given us smartphones, tablets and Internet of Things solutions in abundance from some of the industries biggest players.
If you haven’t been paying attention for the last couple of days, here’s a quick round up of some of the big stories you might have missed.
GRE tunneling: Keeping human traffic unaffected during DDoS attacks
Picture a standard subway ride during rush hour. The car, of course, is crammed full. Some of those subway riders are pleasant commuters, and some are subway villains like pickpockets and purse-snatchers. Now imagine someone has invented a private subway that quickly and efficiently connects you and other pleasant commuters to the subway station in your neighborhood. You don’t have to deal with slowdowns, unexpected stops, or any of the risks associated with being lumped in with the aforementioned subway villains.
Now stop imagining, because someone has invented such a blissful sort of system. It’s just that instead of being a form of transportation it’s a method of directing legitimate human traffic to a website while it’s being protected from a DDoS attack. Not the best news for your commute, but great news for your website.
Baidu's browser leaks sensitive information
The browser provided by Baidu (China's answer to Google), leaks all kinds of personal data. Researchers at Canada’s Citizen Lab tested the browser and concluded it "collects and transmits a lot of personal user data back to Baidu servers that we believe goes far beyond what should be collected, and it does so either without encryption, or with easily decryptable encryption".
The Android version of the browser is even worse: "Data collected and transmitted in the Android version without any encryption includes a user’s GPS coordinates, search terms, and URLs visited. The user’s IMEI and nearby wireless networks are sent with easily decryptable encryption".
Apple, encryption, iPhones, and the FBI plainly explained
Most Americans, and many of the world’s iPhone users, are now aware that a court order was filed on February 16 to compel Apple to assist the FBI in retrieving information from an iPhone. This was the phone uncovered in the aftermath of the mass shooting in San Bernardino in December last year. Apple objected to the FBI’s demands and very public legal maneuvering ensued.
In this article I endeavor to explain some of the key issues that this situation raises, for both privacy and security, as they impact companies, consumers, and governments.
ASUS' routers will be audited for 20 years
Taiwanese hardware manufacturer Asus has agreed to settle Federal Trade Commission charges, the agency reported on Tuesday. Back in 2014, it was discovered that Asus’ routers had poor security protocols, putting hundreds of thousands of users’ data at risk.
Under the settlement, Asus will have to establish and maintain a comprehensive security program, subject to independent audits for the next 20 years. The FTC said the vulnerabilities allowed attackers to gain access to at least 12,900 routers.
Majority of data breaches occur in US
There have been 1,673 data breaches last year. They have led to 707 million data records being compromised. Those are the results of a new report by digital security firm Gemalto, entitled Breach Level Index.
The Breach Level Index tracks all data breaches worldwide, looking at their size, severity, as well as the number of records compromised.
Former employees are a major security threat
If you’re a business owner in the UK, chances are a good portion of your workers are looking for the first opportunity to ditch you.
According to a new report by Ilex International, the identity and access management firm, 59 percent of workers are looking for a new job in 2016. Two reasons are behind this: first that the majority feels underpaid, and the second is that the economy is improving and better prospects are out there.
Enterprises have no protection against mobile malware
Mobile enterprise security firm MobileIron has released its Q4 2015 Mobile Security and Risk Review, discussing the threats and risks that enterprises face in their mobile deployments.
The report reveals the worrying find that more than 50 percent of enterprises have at least one non-compliant device, creating a broader attack surface for malware and data theft.
Google working with carriers to replace SMS
In an effort to modernize SMS messaging, Google and a number of mobile service providers are working together to expedite the release and adoption of Rich Communication Services (RCS).
The company will be joined by the wireless standards group GSMA along with many global and regional carriers including America Movil, Bharti Airtel Ltd, Deutsche Telekom, Globe Telecom, Millicom, Orange, Sprint, Telenor Group, TeliaSonera, Telstra, Turkcell and Vodafone.
Samsung Pay will be available in more major markets this year
After less than a year, Samsung Pay has reached 5 million users in South Korea and the US. The service has already processed over $500 million dollars worth of sales and this number is set to increase as Samsung is preparing to globally expand its mobile payment service throughout 2016.
The company will be launching Samsung Pay in China next month in partnership with China’s UnionPay. Support for the service will then be made available in Australia, Brazil, Singapore, Spain, the UK and Canada later this year.
The top 5 myths about Virtual Mobile Infrastructure (and, oh yeah, the facts)
With more and more enterprises recognizing the need to go beyond securing devices while still finding an effective way to deploy native mobile apps to employees, it's little wonder that remote enterprise approaches like Virtual Mobile Infrastructure (VMI) are receiving more eyeballs in the enterprise mobility space and the scrutiny that comes along with it. With this comes questions, doubts and even fears over the whether this new approach can really fulfill on its promise.
In fact, fears can spiral into outright myths if left to fester. Remember the myth that Macs couldn't get viruses? We all know how that claim turned out. To this end and, without further ado, here's the truth about five of the most common myths you may have heard about VMI.
Ford announces new Kuga at MWC 2016
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.
