tech and geek stuff
IBM Launches Enterprise-Strength Blockchain as a Service
IBM has unveiled the first enterprise-ready Blockchain as a Service offering based on The Linux Foundation's open source Hyperledger Fabric. IBM Blockchain, which lets developers quickly establish highly...
Russian security company to compete with Microsoft via new OS
Kaspersky has launched its own operating system which is built from scratch, designed to offer tight security to Internet of Things devices and industrial control systems.KasperskyOS has apparently been...
Secure Messaging Apps Helps Washington Elite Keep or Leak Secrets
NEWS ANALYSIS: Confide and Signal, two message apps that have features that discourage snooping, have become the favorite of Washington professionals who want to keep secrets. The buzz in official Washington...
Bromium Secure Platform Assembles Endpoint Sensors for Enterprise Security
Bromium expands its virtualization based security isolation and detection approach into a platform play that correlates threats across a distributed network of endpoint sensors. Security vendor Bromium...
Ultra-small nanocavity advances technology for secure quantum-based data encryption
Researchers have developed a new type of light-enhancing optical cavity that is only 200 nanometers tall and 100 nanometers across. Their new nanoscale system represents a step toward brighter single-photon...
SAFECode Gets a New Executive Director
Former Microsoft Executive Steven Lipner, who helped to create the Secure Development Lifecycle (SDL) is the new Executive Director of the Software Assurance Forum for Excellence in Code (SAFECode). SAFECode...
Why a VPN is the simplest way to stay secure online
The internet can be a tricky place to navigate for even the most ardent of user, with data sniffers or hackers lurking looking for a weakness to exploit, advertising cookies and tracking services putting...
Microsoft's Secure Productive Enterprise Bundles Windows, Office, MDM
Microsoft offers businesses a new licensing option that covers client operating systems, productivity apps and mobile device management. One of the many digital transformation-enabling announcements made...
Apple and Samsung destroy their rival
BlackBerry will no longer be making smartphones The mobile phone manufacturer BlackBerry has announced that it will no longer manufacture its own smartphones after a rollercoaster 14 years in the business....
In depth: We challenged Samsung and BlackBerry over their Android security claims
We challenged Samsung and BlackBerryBlackBerry claims to have "the world's most secure Android smartphone" in the DTEK50. The slogan is splashed across its website and can be seen on advertising...
Secure Boot snafu: Microsoft leaks backdoor key, firmware flung wide open
reader comments 19 Share this story Microsoft has inadvertently demonstrated the intrinsic security problem of including a universal backdoor in its software after it accidentally leaked its so-called...
Keeping the Hacker Tracker Mobile App Secure: DefCon
VIDEO: How do you build an app that is secure enough for a hacker conference? LAS VEGAS—The DefCon hacker conference here at the Bally's and Paris Hotels is a massive affair with many rooms, events and...
Breaking: BlackBerry DTEK50 is the world's most secure Android smartphone
BlackBerry has a brand new smartphone, which may come as a bit of a surprise as the Canadian firm continues to struggle in the choppy hardware waters, and the BlackBerry DTEK50 harnesses a more traditional...
IBM Launches Secure, Cloud-Based Blockchain Services
IBM announced a new cloud environment for business-to-business blockchain networks so companies can securely test and run blockchain apps. IBM recently delivered a new secure blockchain service on the...
Goodbye, Obamaberry. Hello, Obamadroid.
White House Photo by Pete Souza (November 10, 2010). President Obama places a call from his secure BlackBerry 8900 from the presidential limo while in Indonesia in 2010. When he took office, Obama pushed...
Secure Web Gateways Fail to Prevent Malicious Attacks
Of the 200 billion total communications observed, nearly 5 million attempted malicious outbound communications were from infected devices. Eighty percent of secure web gateways installed by Fortune 1000...
IBM raises its game in blockchain, with secure cloud services and Docker integration
Bitcoin may still be the most famous application of blockchain technology, but the distributed database architecture is now being applied to a range of other services, from different kinds of (non...
Sirin Labs set to launch secure phone at $10,000 plus
Comments Written by Nandagopal Rajan | Updated: April 25, 2016 9:27 am Sirin Labs’ secure smartphone called Solarin will be launched at the company’s flagship store in London. It is being dubbed the Rolls...
Wardrobe strapped to car using bubble wrap
Looks secure. We good to go. A DOPEY driver was caught at the wheel with a wardrobe strapped to his car roof using bubble wrap. The bungling motorist was pulled over after traffic cops spotted the “quite...
NSA wanted Hillary Clinton to use this secure Windows phone
Sectera Edge secure smartphone. (Image: General Dynamics)Newly released documents under the Freedom of Information Act show that Hillary Clinton, then-secretary of state had asked the National Security...
This is the phone NSA suggested Clinton use: A $4,750 Windows CE PDA
This is what the NSA would have suggested Secretary of State Clinton use as a secure mobile device in 2009: The General Dynamics Sectéra Edge Windows CE secure PDA. Pricetag: $4,750 (not including all...
New twist in case of Facebook exec jailed in Brazil
RIO DE JANEIRO -- A Facebook executive detained for refusing to give law enforcement information about users of the WhatsApp message service was released from jail on Wednesday, part of a tussle between...
Tech and law enforcement: Closer than you think
McLaughlin's keynote session on Wednesday will focus on a concept that sits at the heart of the Apple vs. FBI case: trust in the systems underlying the Internet. "If you don't trust the underlying systems...
A Close Look at IBM's z13s Mainframe for Secure Hybrid Clouds
IBM continues to prove that the mainframe is very much still alive and well, this time by announcing a system that delivers the security of data encryption without slowing down system performance to midsize...
Obama's gadgets: What tech does the president use?
There's no way one can deny Air Force One is the most advanced jumbo-jet in the Western skies. The plane itself is designed to keep the President safe, secure, but also connected to the outside world when...
GCHQ-developed software for secure phone calls open to 'eavesdropping'
This also implies, in theory, that if it were used for sensitive communications by the Cabinet Office, voice calls that use this product could be intercepted and compromised by foreign hackers, without...
Blackberry phones 'as secure as ever'
Blackberry has said its handsets are "as secure as ever", following reports Dutch police had been able to read encrypted messages on its phones. Earlier this month, Dutch police told the BBC they had decrypted...
Ledger Wallet Is One Of The Most Secure Bitcoin Wallets You Can Get
You can call Ledger Wallet CEO Eric Larchevêque the Winklevoss of France given that he stores around 1,000 bitcoins on his bitcoin wallet — that’s around $450,000 as of today. But it also shows...
Hacker-proof security gadgets find their (tiny) niche at CES
CES in Las Vegas was resplendent with consumer gadgets designed to connect you to the outside world. Only a very few were designed to help protect you from it.Private security and privacy devices made...
Identilock Is A Mobile Gun Lock That Keeps Firearms Secure
If a parent makes the choice to keep a firearm in their home, a key decision that follows should be a decision on how to keep the gun protected from kids in the home. Launching today from CES 2016...
Need a secure smartphone? Answer is simple, experts say
(Image: CNET/CBS Interactive) Nothing in this world is secure. If you're finding this out for the first time now, well -- sorry. READ THIS For privacy and security, change these iOS 9 settings right now...
Secure Your Online Activity for Life for $59
Attention, please. We just discovered the best use of sixty bucks since last weekend’s bottomless Bloody Mary brunch for two. And this one doesn’t even come with a 3pm hangover. Get a lifetime...
User Error Compromises Many Encrypted Communication Apps
Apps that aim to let you talk securely may be made less secure by users who screw up the authentication process.Smartphone apps and special phones that aim to ensure secure communication may often find...
Toymaker VTech hires Mandiant to secure systems after cyber attack
(Reuters) - Hong Kong-based digital toymaker VTech Holdings Ltd said FireEye Inc's Mandiant forensics unit was helping the company secure its systems after a hacking attack exposed data on 6.4 million...
CoreOS brings end-to-end trusted computing to containers
Everyone in IT loves containers. They enable you to run four to six times the number of server application instances as a virtual machine (VM) on the same server. Now, if only you could just easily secure...
10 Ways Microsoft Strengthened Windows 10 Security Features
Microsoft CEO Satya Nadella has made several bold moves during his tenure as chief executive and has offered up some rather interesting sound bites. But one of his boldest comments came on Nov. 17, when...
Security key to digital transformation
New security approaches need to be developed for new technologies like those aimed at enabling the internet of things (IoT), according to PTC senior system specialist Sebastian Bergner. “One of the most...
Imation IronKey Basic S1000 USB 3.0 Flash Drive (16GB)
Imation makes some interesting products, like the 16GB Link Power Drive that combines a flash drive and a backup battery, and the IronKey Workspace W500, a portable version of Windows in your pocket....
Vera Joins Forces With Dropbox And Okta On Secure File Sharing
Vera, a secure file transfer company announced an agreement today with Dropbox and Okta to offer customers a way to transfer files in a secure fashion from end to end. While Dropbox, Vera and Okta...
Good Technology Expands EMM Platform to Windows
Good Access for Windows provides a secure environment for deployment of HTML5 apps, securing corporate Web apps in containers. Good Technology announced the launch of a secure solution for Web apps for...
Does Your Airline Really Understand Data Security?
A friendly reminder to organizations in regular communication with the public: You never know who John Q. Public is; for example, it could be me--Adam K. Levin. (Not to be confused with the singer of the...
G Data Secure Chat (for Android)
What would the ultimate secure texting app look like? Well, it would send both encrypted and unencrypted messages, letting it function as a full-blown messaging app replacement as TextSecure does. It...
Bluetooth and NFC come to FIDO Universal 2nd Factor Specification
The U2F 1.0 specification is now being expanded to support the wireless Bluetooth and near-field communications (NFC) protocols. What U2F provides is a second-factor authentication mechanism that can...
Google makes it easier to share photos, notes and more with family members
Because constantly swapping passwords and usernames can be a pain, (if not also a security risk) Google is adding new ways for families to share with each other while still staying logged-on to their...
DeepMind’s AI beats world’s best Go player in latest face-off
Ke Jie deep in concentration during the first matchWU HONG/EPA/REX/ShutterstockBy Matt ReynoldsAlphaGo is at it again. Google DeepMind’s Go-playing AI has defeated Ke Jie, the world’s number one player,...
Google's AlphaGo A.I. beats world's number one in ancient game of Go
This week's games between AlphaGo and Ke are being live streamed by Google online, but Chinese censors already block access to Google and its services, such as Gmail and YouTube, in the country. Chinese...
All 38 major Google IO announcements ranked
Google IO is the company’s chance to express its bragging rights, and it did that at the start of its keynote by telling one and all that Android is now up to 2 billion active users.What’s more, seven...
I regard the brain as a computer which will stop working when its component fail. There is no heaven or afterlife for broken-down computers. That is a fairy story for people afraid of the dark