Intel announces new Xeon E3 processors for multimedia workloads

intel_logo_building

At this year’s Computex show in Taiwan, Intel announced that it is adding new chips to its Xeon E3 1500 line of server processors to help service providers handle the massive amounts of online video-related traffic created by the "visual cloud".

Webcasts, video-conferencing, digital TV broadcasts, cloud gaming, video transcoding and even the delivery of remote workstations all make up what the company and other chipmakers have begun to refer to as the visual cloud. The new chips that Intel is adding to its Xeon E3-1500 line have been created with extra capabilities that aid in accelerating video and multimedia workloads.

Continue reading

420 million mobile device users block ads

no ads ad block

Businesses whose revenue come from mobile ads will seriously have to consider an alternative, because news just came in about a significant rise in mobile ad blocking usage.

According to a new report by PageFair, a start-up helping publishers get around ad blockers, and mobile app tracking company Priori Data, there has been a 90 percent rise in mobile ad blocking usage, compared to the same period last year.

Continue reading

New Microsoft Ventures to invest in promising startups

Microsoft sign in California Silicon Valley

Microsoft has today announced a new department designed to invest into disruptive start-ups in their early phases.

The department, led by Nagraj Kashyap (corporate vice president) and executive vice president of business development Peggy Johnson, holds the name Microsoft Ventures.

Continue reading

How to secure your open source code

open source bubble

It’s an open source world. Black Duck and Northbridge’s recent 2016 Future of Open Source Survey found that 78 percent of the over 1300 respondent companies said they run open source software. The number is likely much higher.

Black Duck finds open source software (OSS) in over 95 percent of the applications we analyze for clients. It’s easy to understand why. Open source adds needed functionality while lowering development costs and accelerating time to market. But securing and managing open source code still remains a challenge for many organizations.

Continue reading

Going out of business: An important, but forgotten security precaution

closed_forever

It takes a lot to launch a business in today’s competitive landscape. Unfortunately, not all find success and some end up shutting their doors for good. A company could be going through a merger or acquisition, as is the case with Office Depot, which is in the process of closing up to 400 locations following its 2013 merger with OfficeMax. Of course, there’s another reason -- a company could be facing mounting debts and a decline in sales. That’s what is happening to the once popular fashion retailer American Eagle, which has seen its net income take a huge dip from $400 million in 2008 to $80 million in 2015 and will be closing 150 locations by 2017.

Once any business makes the decision to shut down -- even if it only has one location -- there is one very important, but often forgotten, step that needs to be taken. Data needs to be permanently erased from every single piece of equipment and environment where corporate, customer and employee data are stored.

Continue reading

Three steps to BYOD bliss

BYOD key

BYOD has now become so prevalent that 29 percent of UK secondary schools are now operating some sort of BYOD policy including asking students to bring their own devices. While the enterprise world has been talking about BYOD for years, it’s this kind of mainstream use that confirms BYOD as a way of life, and of business.

While there are clear benefits in terms of productivity for example, unfortunately, security still remains a key concern. In order to take advantage of the potential benefits and avoid the security risks, organizations need to do three core things: develop a robust BYOD policy, choose the right security technology, and support the people using it.

Continue reading

SWIFT hack affects 12 more banks

cyber criminal

Earlier reports of a couple of banks using the SWIFT (Society for Worldwide Interbank Financial Telecommunication) system being hacked are now paired with new reports saying that additional 12 banks using the same system might have fallen victim to the attack.

According to security researchers FireEye, which have been investigating the matter, "numerous" other banks have contacted them, including banks from the Philippines, and New Zealand. Even though the majority of these attacks were thwarted, approximately $81 million made it to the Philippines and ended up at casinos, where its trail is lost.

Continue reading

Hacker offers 427 million MySpace passwords for just $2,800

Hacker

You know your website isn’t worth much when a database of 427 million stolen login credentials are being sold online for roughly $2,800 (£1,920).

Yep, that’s what happened to MySpace over the weekend. But Myspace not being worth much nowadays is not the news. Possibly the biggest login credentials theft, is.

Continue reading

CEO falls for email scam, loses $47 million

scam definition dictionary highlight

An airplane parts manufacturer has fired its CEO after the poor guy got scammed, costing the company €42 million ($47 million).

"In the supervisory board meeting, held on May 24, 2016, Mr. Walter Stephan (CEO) was revoked by the supervisory board as chairman of the management board of FACC AG with immediate effect for important reason. The supervisory board came to the conclusion, that Mr. Walter Stephan has severely violated his duties, in particular in relation to the 'Fake President Incident'. Mr. Robert Machtlinger was appointed as interim CEO of FACC AG".

Continue reading

How IT admins can support cloud adoption

businessman on cloud

Iron Man. Captain America. IT administrator. Yes, you read that correctly. As organizations make their shift to cloud computing technologies, including Microsoft Azure and Office 365, IT admins can be crucial -- but often overlooked -- assets.

These superheroes of the technology world can save their organization from technological chaos, stop compliance issues in their tracks, and spread their technical knowledge for the good of the organization. So how can admins prove their worth in the rise of the cloud?

Continue reading

Lazarus may be responsible for Bangladesh Central Bank hack

Cyber attack

The group that tried to steal a million dollars from the Vietnamese Tien Phong Bank, managed to steal $81 million from Bangladesh's Central Bank, and managed to steal $12 million from a bank in Ecuador, also attacked a bank in the Philippines.

However, it remains unclear if the group actually managed to steal any money from this bank or not. What we do know, though, is that all these attacks seem to be pointing at the same hacking group, known as Lazarus.

Continue reading

Citrix to offer cloud services through Microsoft Azure

Cloud handshake collaboration

Citrix and Microsoft announced recently that they will be expanding their partnership. More precisely, Citrix will use Microsoft’s Azure as its cloud.

Besides Azure, they will also integrate Citrix XenMobile and NetScaler into Microsoft’s Enterprise Mobility Suite.

Continue reading

Debunking seven fundamental cyber-security myths

Myths newspaper paper

If we look at the world of cyber security through the eyes of the media, it’s a pretty frightening view. We hear story after story of security breaches hitting major companies and the next data leaks that follows affecting thousands of people. It’s enough to fill any business with trepidation.

With cyber security such a big talking point, we tend to see a lot of information floating around -- some of which is not in the least bit true. If a company wants to enhance its IT security it is imperative to be able to separate facts from fiction.

Continue reading

Five most common myths about web security

Internet Explorer 11 gains HTTP Strict Transport Security in Windows 7 and 8.1

Almost 3 terabytes of data stolen in the Panama Gate scandal will shortly become searchable online. Mossack Fonseca, the breached legal firm behind one of the largest data leaks in the history, had numerous high-risk vulnerabilities in its front-end web applications, including its Client Information Portal. Actually, few hacking groups would spend money on expensive zero-days and complicated APTs, when the information can be easily stolen via insecure web applications. Moreover, even if your corporate website doesn’t contain a single byte of sensitive data, it’s still a perfect foothold to get into your corporate network.

Today many people, including cybersecurity professionals, underestimate the importance of web application security, focusing their attention rather on APT detection, enterprise immune systems and other activities applicable when it’s already "too late" to react to prevent the breach. A common-sense approach suggests that before installing expensive anti-burglar equipment and alarm in a house, the owner should first close the doors and the windows and probably build a fence around, otherwise you’re throwing money down the drain. Let’s have a look at five most common myths that exist today about web application security, leading to sensational data breaches, huge financial loses and CISO dismissals:

Continue reading

Financial services believe blockchain is the biggest innovation since the Internet

Blockchain word cloud

Blockchain is the most important innovation since the creation of the internet, almost two thirds (60 percent) of global financial services retailers with some knowledge of the technology said.

That’s a bold claim.

Continue reading

Load More Articles