Is the Internet of Things the next Industrial Revolution?

Steam engine

The Industrial Revolution changed society and led to the growth of towns and cities with consequent mass production and movement of population.

Electronics retailer RS Components has produced an infographic looking at how the Internet of Things is leading a move to create a new industrial internet, powered by intelligent machines.

Continue reading

Best Windows apps this week

zootopia

One-hundred and eighty-seven in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 8.x and Windows 10 in the past seven days.

VideoLan, maker of the popular VLC Media Player, has released a new version of VLC for Windows Store. It is a universal application that supports features such as Cortana, Continuum or Live Tiles.

Continue reading

Google's 60 Tbps undersea cable connecting US and Japan is live

Google logo sign building

Japan’s Internet is set for a large speed boost as Google’s 9,000km undersea Internet cable that connects the country to the United States is now officially up and running.

In 2014, the company announced that it would lay an undersea cable connecting the two countries that would have a 60 terabits per second capacity. Google’s senior vice president of technical infrastructure, Urs Hölzle, said the cable has a capacity that is "more than any active subsea cable" and is "10 million times faster than your cable modem".

Continue reading

AVG announces 6 new tools to free your data from ransomware

Ransomware eye

Ransomware has gone mainstream with several high-profile attacks. It essentially locks your data away and demands money to free it – essentially mob protection money. While some tools have been released to aid frantic people in these times, most versions have gone unfixed.

Now AVG, the free antivirus company, has come out with six new tools designed to fight this affliction. Each is for a different form of this malware.

Continue reading

Microsoft sets off fireworks with Windows 10 Insider Preview Build 14379 for PC and Mobile

Fireworks

Fourth of July is coming up this Monday, and tomorrow is Friday. This is significant in the business world, as many folks transform a three-day weekend into four by taking off the Friday before a holiday. In other words, it is a great way to get a mini-vacation while only sacrificing a single vacation day.

Apparently, Dona Sarkar and team are getting an early start on celebrating USA Independence. In anticipation of the extended weekend, she is setting off some fireworks -- figuratively speaking, that is. Today, Microsoft releases Windows 10 Insider Preview Build 14379 for PC and Mobile to the fast ring.

Continue reading

Cisco buys cloud security provider CloudLock

Cisco

Cisco has announced that it will be acquiring the cloud-based security provider CloudLock for $293 million in cash and equity.

CloudLock makes use of application program interface (API) technology to allow enterprises to apply and monitor the security of documents and other content that is accessible via cloud-based applications. The service works with Office 365, Google Drive, Salesforce applications and thousands of other apps and programs.

Continue reading

Google reveals that Android N will be called... Android Nougat!

Android-n-nougat

The developer previews of Android N have been available for a little while now, giving a tantalizing taste of what’s to come. But one thing has been missing: the name.

After months of teasing and misdirection -- there can't be many people who weren't expecting to see Android Nutella -- Google has officially announced that Android 7 (probably) will be known as Android Nougat.

Continue reading

Let there be light: Why visibility is key to building an effective mobile policy

Business mobile devices

Consider this: Unrestricted use of Tinder may not pose a problem at a company where the majority of staff is over fifty, but if you work with millennials, you may need to swipe left and reject your current mobile policy. Don’t let your company be the next one to lose precious data and suffer the devastating cost of a data breach simply because you lacked visibility and control over how your investment in mobility is having an impact on the organization.

The mobile device is a distinctive technology that delivers tangible benefits in both personal and business settings. According to IDC’s U.S Mobile Worker Forecast, mobile workers will account for nearly three quarters (72.3 percent) of the total U.S. workforce -- or 105.4 million employees -- by 2020, creating an environment where workers expect to leverage mobile technology at work. As enterprise IT begins to more widely deploy mobile technologies in support of everyday business, mobile devices must increasingly meet corporate standards for security, compliance and acceptable use.

Continue reading

Declare independence from Windows 10 by downloading Linux Mint 18 'Sarah' now!

Penguin_02

As we approach the Fourth of July weekend, I begin thinking about independence. I am very proud of my forefathers for defeating the British -- our now-ally -- and creating our great nation, the USA.

With that said, there are other things from which you can declare independence -- such as Windows 10. Look, I think Microsoft's desktop operating system is pretty good, although I understand that some folks are fearful of spying and forced-upgrade behavior. If you want to be free from Microsoft and Windows, I have good news -- today, Linux Mint 18 is finally available. Will you download it and declare your independence?

Continue reading

Anonymous takes the FBI to task for corruption

anonymous watching

Hacktivist collective Anonymous targets all sorts of people and organizations. Past and on-going operations have focused on Islamic State, white supremacists, the Church of Scientology, Ku Klux Klan, and Donald Trump.

Whatever your view on Anonymous, the group certainly likes to pick fights with high profile foes. The latest organization to have the Anonymous spotlight shone on its affairs is the Federal Bureau of Investigation.

Continue reading

Home alarms let users keep default credentials

Home alarm smartphone

German investigative journalists from the c’t magazine said many home security systems come with a huge vulnerability which can put every home using the system at risk.

The vulnerability, however, is nothing fancy in hacking terms -- it’s pretty obvious and straightforward, but frequently overlooked. You see, similar to Internet routers, these home security systems are configured through a browser, and many come with easily crackable passwords like "1234" or "admin1234".

Continue reading

At long, long last, Google Maps on Android and iOS has multiple destination support

google-maps-multi-stop

Google Maps has long been helping walkers, drivers and cyclists get from A to B. But for far too long, the desktop version of the navigation tool has been more powerful than the mobile version -- which is silly, really, as the mobile app is the one you're going to use while, you know, traveling.

Today, Google is rolling out an important new feature to the mobile app -- the ability to configure a route with multiple stop-off points along the way. Getting from A to B is great, but sometimes you need to go via X and Y. Now you can.

Continue reading

Euro 2016 app leaking private user data

Smartphone lock unlocked key

I’ve been trying not to think about Euro 2016 after England’s whimpering exit on Monday night, but new research from mobile security and management firm Wandera has grabbed my attention.

According to analysis of data traffic patterns from enterprise mobile devices, the official UEFA Euro 2016 Fan Guide App is leaking user’s personal information -- including usernames, passwords, addresses and phone numbers -- over unsecure internet connections.

Continue reading

What makes an adversary profile invaluable?

Hacker desk laptop hoodie hacking hooded

One of the most common questions I am asked when collaborating with customers is "…what makes a useful adversary profile?" The easy answer is any summary that allows your team to make faster and more accurate decisions when push comes to shove, but the deeper answer is more artful than scientific.  Adversary profiles are the intelligence intersection across a team’s defensive efforts and can demonstrate a distinction from teams who have made a conscious decision to transform from 'whack-a-mole' to 'know thy enemy'.

So…What makes an invaluable adversary profile? Here are a couple points you should consider when structuring an adversary blueprint.

Continue reading

New cloud platform gives companies insight into channel sales

Business laptop graph

Companies selling IT solutions via channel partners can easily find that they spend all their time dealing with resellers and distributors, and consequently lose touch with their end users.

Channel management company Zyme is launching a new cloud platform that helps global B2B and B2C enterprises monitor and optimize the performance of their distribution channels through timely, actionable intelligence.

Continue reading

Load More Articles