Fujitsu, Toshiba and Vaio plan to merge PC divisions

Handshake

Toshiba, Fujitsu and Vaio, which was recently spun off from Sony, have entered into the final round of negotiations to integrate their PC divisions.

If the three firms can reach an agreement, they plan on establishing a joint holding company with subsidiaries responsible for running each firm's PC businesses.

Continue reading

Your VoIP phone could be used to spy on you

phone_exchange

You should be careful when running voice-over-IP (VoIP) phones, as weak passwords could turn your device into a covert spying tool.

Security consultant Paul Moore says he has discovered how default and weak passwords on enterprise-grade Snom VoIP phones could allow attackers to make their own calls using your service, or listen to your conversations.

Continue reading

Why peer to peer lending is a disruptive industry [Q&A]

Cloud money

In the last ten years, peer-to-peer lending has grown to be a serious disruptive influence in the financial services landscape.

Jaidev Janardana, CEO of Zopa, the world’s first and UK’s leading peer-to-peer lending platform, discusses why the industry has proved so disruptive and what the future holds.

Continue reading

Amazon Web Services buys NICE to strengthen cloud offerings, boost customer base

amazon a

Amazon Web Services, Amazon's cloud computing arm, has bought the Italian software and service company NICE for an undisclosed sum. AWS is after NICE’s 2D and 3D desktop cloud virtualization software that allows 3D developers and game designers access to work remotely from any type of computer.

This works because the hardware required to render the 3D images is supplied by the cloud not the computer that the developer is using to access their designs.

Continue reading

Intel may soon launch 10TB SSDs

Intel Logo

Intel’s SSDs may soon see a significant increase in their capacity and speed as a result of Micron’s latest chips, which could also be used to create competitive SSDs that are as small as flash drives.

Micron is responsible for producing the flash which is used in Intel’s SSDs and now it has begun manufacturing and distributing its 3D NAND flash in large quantities. The company’s 3D flash chips would allow tiny SSDs to reach a capacity of 3.5TB, and 2.5 inch SSDs could possibly hold even more than 10TB of storage.

Continue reading

Women are excellent coders, according to GitHub research

laptop woman

A survey back in 2013 found that only 11.2 percent of software developers were female. Working then on the premise that males would be prejudiced against female coders work, a group of students has now studied the acceptance rate of GitHub pull-requests by gender.

A pull-request is when volunteers submit work to a project and it receives some scrutiny by the project team, they often accept the work or reject it with some advice. What the study team has discovered is that 78 percent of work submitted by women was accepted, which compared favorably to only 74 percent for men.

Continue reading

Ransomware is lucrative -- almost half of all victims pay

ransomware key

I recently covered a story in which security firm Imperva said Cryptowall 3.0 was the most successful ransomware of all time, earning its creators $325 million (£225.7m) so far. Now another story about ransomware emerges, and this one comes from another major security firm, Bitdefender.

In its report, the company says almost half (44 percent) of all ransomware victims have paid to get their data back, with 39 percent saying they expect to be attacked again, in the future.

Continue reading

What you need to know about biometric security

fingerprint scanner

Generally speaking, biometrics refers to the measure or statistical analysis of a person’s physical or biological characteristics. However, increasingly the term is being defined more narrowly, at least in a business context, to refer to biometric security.

Although passwords can be guessed and network vulnerabilities exploited, overcoming biometric security protocols is significantly more challenging. For example, how would a cybercriminal go about duplicating a fingerprint or an iris scan? As a result, the unique aspects that make up our physical features are increasingly being utilized for authentication methods by businesses all over the world.

Continue reading

IT security experts are confident they can spot a data breach

data breach

A new study by security firm Tripwire says IT security experts are very confident they can detect a breach, and that they can detect it quite fast. For automated tools, they do not share the same levels of confidence.

The survey questioned 763 IT professionals in various verticals, including retail, energy, financial services and public sector organizations in the US, about the seven key security controls that need to be in place in order to quickly spot an ongoing hack attack.

Continue reading

Should you use Amazon S3?

Amazon logo

In any discussion about cloud computing, it is becoming harder and harder to ignore Amazon Simple Storage Service (S3), the massively scalable, cost-effective cloud storage solution developed specifically to house the huge influx of data created by organizations worldwide.

Amazon S3 commands twice the market share of all its closest competitors combined and is likely to be the storage platform of choice for on-premise hybrid or private cloud deployments for some time to come.

Continue reading

The tech industry's greater responsibility

censor blindfold

Today, Internet censorship is becoming a growing concern among dozens of developing countries. In the mid-1990s, China began blocking foreign websites and saw successful results, proving to other authoritarian countries wishing to control their constituents that these types of regulations are well worth the effort. Since then, Iran, North Korea, Cuba, Azerbaijan, Syria and others have followed China’s footsteps and began implementing regulations censoring Internet activity.

This means that the people living within these countries are unable to access information from the outside world. Thus, they are fed filtered information that praises their leadership and government, and because they are not exposed to varying and contrary opinions, are susceptible to believing and accepting their government’s authoritarian policies. In western countries we often take our first amendment right for granted. We are allowed to say, write, and scream whatever we’d like about our government without the risk of being jailed or beaten. We’re allowed, even encouraged, to question policies and think differently. If only this were the case worldwide.

Continue reading

Rampant waste: the hidden cost of enterprise software

money cash burn fire

A new Flexera Software report reveals that most organizations are unnecessarily wasting significant portions of their enterprise software budget.

Consider these statistics: 75 percent of enterprises are out of compliance with regards to at least some percentage of their software, 44 percent of enterprises (compared to only 25 percent the prior year) paid $100,000 or more in true-up costs to their software vendors as a result of noncompliant software use; and for 20 percent (up from only 9 percent in the prior year) the software audit true-up costs were $1,000,000 or more! In addition, 93 percent of organisations report spending money on at least some software that is under-used -- i.e. shelfware.

Continue reading

App stores to generate over $100bn in revenue in five years

Streaming video service Hang w/ shares its profits with users -- others take note!

When apps first came to smartphones, it completely changed the ways users interacted with their devices. Mobile phones went from being just phones that could make calls and send short messages to devices that resembled miniature computers.

Apple’s App Store and the Google Play Store saw a dramatic rise in the number and quality of the apps they offered almost instantly. For many users, apps have become commonplace and they no longer hold our interest or excitement as they once did.

Continue reading

Everything you need to know about SIM swap scams

SIM Card Phone Smartphone

In today’s mobile-centric world, using mobile phones for Internet banking is standard practice for most people, but do customers know they could be at risk of a new type of scam?

SIM swap fraud, where scammers cancel and re-activate new SIM cards to hack into bank accounts, is reportedly on the rise.

Continue reading

It's too easy to breach a bank

bank

I arrived onsite to suite 102 -- the bank’s corporate headquarters -- around 9:40 am. I was impersonating a local utility worker -- with all the garments like a hardhat, clipboard, obnoxious yellow vest, and some old Timberland work boots. I played the part well.

When I approached the suite I saw a giant glass entrance into the main office of the bank with a secretary minding the entrance and questioning visitors. I also noticed employees were entering and exiting an unmarked door at the end of the hallway -- no cameras to be seen. I proceeded slowly past the main entrance and then ran to catch the secured door as it was closing behind an unsuspecting employee. I was in!

Continue reading

Load More Articles