tech and geek stuff
Cramer: North Korea tensions have eased but an Amazon threat still looms
While tensions from North Korea appear to have eased, a threat from Amazon still hangs over the market, CNBC's Jim Cramer said Tuesday. U.S. stocks were higher Tuesday as investors breathed a sigh of...
Foreign hackers penetrating UK infrastructure
The document, produced by the UK's National Cyber Security Centre (NCSC), says the intelligence and security agencies believe attackers have compromised organisations connected to the UK grid.The eight-page...
Thailand Backs Off Threat to Block Facebook Over Content
Thailand backed off a threat to block Facebook on Tuesday, instead providing the social media site with court orders to remove content that the government deems illegal. Thailand made the threat last week...
Amazon halts sales of Indian flag doormat after visa threat
MUMBAI (Reuters) - Amazon.com removed doormats resembling the Indian tri-color flag from its Canadian website on Wednesday, after an Indian government threat to rescind visas of the U.S. company's employees...
Anomali Debuts Free Cyber-Threat Intelligence Tool for STIX/TAXII
Anomali's New STAXX cyber-threat intelligence offering aims to help fill the void left from the shutdown of the Soltra Edge software effort. Security firm Anomali announced on Nov. 21 the debut of its...
Ransomware Risks Increasing, Kaspersky 3Q16 Report Finds
The third quarter of 2016 was yet another active period for hackers worldwide, according to the "IT Threat Evolution Q3 2016" report from Kaspersky Lab, which was released Nov. 3. The report is derived...
Windows zero-day exploited by same group behind DNC hack
Enlarge / That bear looks familiar. reader comments 1 Share this story On Oct. 31, Google's Threat Analysis Group revealed a vulnerability in most versions of Windows that is actively being exploited...
Terror fears for Australia’s cyber security
Local government networks suffered 1095 serious cyber assaults in the 18 months to June 30 this year. Picture: Supplied. TERRORISTS could soon have the ability to infiltrate and wreak havoc on secure Australian...
Juniper Bolsters Security Capabilities in Its Networking Portfolio
At its NXTWORK conference, company officials unveil Policy Enforcer, which automates policy enforcement and quarantines infected endpoints. Juniper Networks is rolling out an array of new and enhanced...
Why Enterprises Need to Guard Themselves Against Shadow Data Threat
Shadow IT, the common practice of employees, partners and contractors using applications outside the purview of an enterprise IT system, is both a promoter of speedy work and a huge security liability....
Intelligence Officials: Technology Allows Terror Threat to Spread
Even though the U.S.-led coalition has made progress in efforts to oust Islamic State from its "caliphate" in Iraq and Syria, top U.S. intelligence officials warn that technology is allowing the threat...
Why Software-Defined Security Can Shore Up Branch Office Weak Links
Branch-office networks are proving to be a weak security link in many enterprises. In the 2013 Gartner Research report, "Bring Branch Office Network Security Up to the Enterprise Standard," analyst Jeremy...
Proliferation of Pokémon Go Gamers Boosts Security Threats to Enterprises
NEWS ANALYSIS: While there’s nothing wrong with Nintendo’s Pokémon Go game itself, its popularity and number of crazed users raise the threat level significantly as vulnerabilities expand. By now you've...
SecureAuth Threat Service Helps Protect Against Cyber-Crime
The platform provides context around the IP address such as the attack type and classification of the threat actor(s) and infrastructure involved. Adaptive access control specialist SecureAuth announced...
Sophos Security Heartbeat Links Threat Management to Modern Firewalls
Sophos has combined the best features of its endpoint security applications with the firewall technology of its Astaro and Cyberoam subsidiaries to create a new class of advanced firewalls. The combined...
Using Power Analysis to Fingerprint IoT Threats
Network security can only go so far, and there are plenty of incidents where an insider threat is responsible for an attack, Steven Chen, founder and CEO of PFP Cybersecurity said. PFP's technology cannot...
Google receives threat at HQ, police say - CNET
Police said they helped Google security after a threat Friday. Brooks Kraft/Corbis Police helped "assisted" Google security at its corporate campus in Mountain View, California, after a threat Friday,...
Google headquarters evacuated after threat
Google headquarters in Mountain View, Calif.(Photo: Justin Sullivan, Getty Images) SAN FRANCISCO — Buildings on Google's Mountain View, Calif., campus were evacuated late Friday afternoon after a threat...
Barracuda Advanced Security Protects From Targeted Email Attacks
Barracuda leverages its global threat intelligence across all network threat vectors--including network, user, Web applications and remote access. Security specialist Barracuda announced an anti-phishing...
Experts: Global Terror Threat Calls for More Coordination
European government officials say the Brussels attacks on March 22 highlight the need to more swiftly share information among governments and intelligence services. In California, two terrorism experts...
Microsoft Cures Breach Blindness for Enterprises
A new offering, called Windows Defender Advanced Threat Protection, alerts administrators if attackers gain a foothold on a network. Suffered a network breach? Microsoft's latest cloud-based data security...
Microsoft unveils new Windows 10 threat protection service
Microsoft is working on Windows Defender Advanced Threat Protection, a new service aimed at enterprises for detecting and responding to advanced attacks.The client piece of the service will be built into...
DHS Ready to Share Intelligence With Private Sector
The U.S. Department of Homeland Security this month will start sharing threat information with a small number of hand-picked companies under the newly enacted Cybersecurity Information Sharing Act. DHS...
Dangerous new ransomware Locky threatens to throw away the key
There's a new strain of ransomware to be aware of, similar to Dridex, which goes by the name of Locky.Ransomware is malware which locks files (encrypting them) on the victim's computer, and demands payment...
Big Data Analysis Makes Breaches a Greater Threat to Cyber-Security
NEWS ANALYSIS: While the theft of employee information is a problem for the staff at government agencies, the fact is that it's also a threat to national security once it's part of a big data research...
FireEye Picks Up Fellow Cybersecurity Intelligence Firm iSight For $200M
Cybersecurity and analysis firm FireEye has boosting its service with the acquisition of competitor iSight in a $200 million deal. FireEye, which is a member of the billion dollar ‘unicorn’ club, has...
15 Emerging Trends in the Security Sector for 2016
Even people who don't follow the news regularly know that 2015 was a year of fearsome cyber-threats. What was considered an "advanced" threat in years past has become a commodity today, with sophisticated...
China’s Dubious New Anti-terror Law Set to Pass
China is set to pass its controversial new anti-terrorism law on Sunday, the largely rubber-stamp parliament said on Friday, despite U.S. criticism about its cyber provisions and concerns over human rights....
The biggest threat to cybersecurity in 2016
Hackers are expected to broaden their net in 2016. IF YOU thought cybercrime was at its proverbial summit, you are in for a shock in 2016. According to security services vendor Proofpoint, cybercriminals...
Australian university launches cyber security master's degree
The University of New South Wales (UNSW) in Canberra will teach a one-year master's degree in cyber security, strategy and diplomacy from February 2016 in a direct response to the growing threat of nation...
Gucci, YSL, others suing Alibaba back down on mediation threat
NEW YORK (Reuters) - Gucci, Yves Saint Laurent and other luxury brands suing Alibaba Group Holding Ltd for promoting the sale of counterfeit goods have backed away from their threat to withdraw from mediation,...
Space junk: What happens when it crashes back to Earth? (pictures)
Not much of a threat is expected to come from WTF. But the threat of space debris is so real for workers aboard the International Space Station that a procedure is in place in case flying flotsam comes...
Know thy enemy: Symantec launches cyberthreat intelligence service for the enterprise
Symantec has introduced Directed Threat Research, a DeepSight Intelligence service which provides the enterprise with tailored answers to their cybersecurity questions. Businesses have had to move quickly...
Strong earthquake hits eastern Indonesia; no tsunami threat
A strong earthquake struck off eastern Indonesia on Wednesday, causing people to flee their homes in panic, but there were no immediate reports of injuries or damage, and authorities said there was no...
Engineering researchers seek remedies for threat posed by drones to commercial airliners
Virginia Tech researchers are urging changes in how commercial aircraft engines are designed in the wake of a possible new threat to passenger aircraft safety: the likelihood of drones, or unmanned aerial...
Study highlights climate threat to king penguins
Warmer sea temperatures are forcing Indian Ocean king penguins to travel further for food, cutting into their breeding season researchers said Tuesday, warning of a "serious threat" from climate chang...
Google seeks common cause with media firms over ad blocking
FRANKFURT (Reuters) - Google says European media firms, often the search giant's harshest industry critics, share a common threat because a surge in ad-blocking technology is a threat to all businesses...
Smell of dead can threaten humans: Study
LONDON: The smell of dead organisms can trigger fight or flight in us, according to a new study which suggests humans, like other species, can perceive certain scents as threatening. Dr Arnaud Wisman,...
Endangered orangutans face a new threat
The loss of habitats is the greatest threat to the endangered orangutans, and now a new study says their existence could be further jeopardized if conservation efforts don't include reintroducing these...
Visa and FireEye bolster security partnership with new threat intelligence service
The subscription-based service includes a Web portal where Visa clients can share and view cyber intelligence, forensic threat analysis from recent data breaches, and information on malicious software...
Security Think Tank: Threat intelligence feeds not for everyone
Before an organisation can apply threat intelligence and make productive use of threat indicators, they have to be at a certain level of operational maturity. Threat intelligence feeds are not necessarily...
Security Think Tank: Security intelligence is useful only if isolated from the noise
The steady parade of attacks disclosed throughout 2015 has made it abundantly clear that current security efforts and checkbox compliance are not sufficient for protecting against increasingly sophisticated...
Security Think Tank: Security intelligence demands getting the basics right
According to the Ponemon Institute, 65% of firms believe threat feeds are one of the most effective tools for helping to detect breaches, yet 54% do not collect threat indicators from their own incidents...
Security Think Tank: Addressing the gap between security data and intelligence
It is clear there is a disconnect in organisational security when it comes to using threat indicators effectively. While businesses acknowledge there is definite benefit from using indicators to help...
The best Uber videos on the internet
Tfl has now launched a consultation on a series of measures, including the introduction of an interval of at least five minutes between a booking and the start of a journey and the requirement for drivers...
Warning over drone threat to prisons
There were nine attempts to infiltrate prisons using drones in the first five months of 2015, the Ministry of Justice confirms, as a senior analyst warns they pose an "emerging threat" to prison secur...
LogRhythm Extends Threat Analytics Suite with Endpoint Module
Security intelligence firm LogRhythm is looking to help IT more quickly detect intruders with its latest offering Endpoint Threat Analytics Module. It supplements LogRythm’s current threat analytics...
Webroot Releases Security Toolkit for IoT Devices
The toolkit is designed to help protect this next generation of critical systems against external threats and internal vulnerabilities. Webroot announced the release of its IoT Security Toolkit, which...
Amazon Fire HD 10 (2017)
Amazon takes a lot of the spots in our best cheap tablets round-up, proving the company is perfecting its affordable tablets with respectable specs on board and super low prices.The Amazon Fire HD 10...
Founded in 2011 to support online gaming, Luxembourg-based G-Core Labs now offers powerful management hosting packages and a very capable, enterprise-level CDN.G-Core's network covers more than 40 locations...
Samsung Gear Fit 2 Pro
Update: The Samsung Gear Fit 2 Pro is now available. We've updated our early impressions with pricing and availability information. Stay tuned for our full review to see if this one's worth checking out.Original...
Apple Watch 3
The leaks were all true: the Apple Watch 2 has been given an update just a year after launch, but with only a minimal set of changes.The new device isn't a huge upgrade on the previous iteration by any...
I regard the brain as a computer which will stop working when its component fail. There is no heaven or afterlife for broken-down computers. That is a fairy story for people afraid of the dark