Juniper, a major manufacturer of networking equipment, said on Thursday it found spying code planted in certain models of its firewalls, an alarming discovery that echoes of state-sponsored tampering. Read More ▶ | | | White Paper: SSH Communications Security With the AWS Marketplace 1-click deployment, a simple proof-of-concept can be ramped up in less than 30 minutes, without impacting any existing operations. Read More ▶ | You'll have to register that new drone you get, California is opening its roads to public use of autonomous cars and NASA is looking for new astronauts. Follow host Nick Barber on Twitter @nickjb Watch Now ▶ | | A major cyberattack next year will target a U.S. election, security expert Bruce Schneier predicts. Read More ▶ | | Microsoft delved even deeper into providing software for Android on Thursday with the launch of Microsoft Apps, a new application that gives users of Google's operating system a one-stop shop to find apps like Word, Cortana and Bing. Read More ▶ | | | Data sovereignty has become a hot-button issue ever since the EU's top court struck down the Safe Harbor agreement in October, and for many users of file-synchronization and sharing services, it poses a considerable problem. OwnCloud CEO Markus Rex sees it as more of an opportunity. Read More ▶ | | Microsoft will offer Chinese government users a special version of Windows 10 as part of a new joint venture, the company announced late Wednesday. Read More ▶ | | Choosing the best photos has always been more a matter of art than of science, whether it's for a Facebook page or a marketing campaign. That may soon change, however, thanks to some new technology out of MIT. Read More ▶ | | The Microsoft SmartScreen filtering technology built into Internet Explorer and Edge has now been updated to block Web-based attacks that silently exploit software vulnerabilities to infect computers. Read More ▶ | | White Paper: SSH Communications Security A basic tenet of security is to apply the strongest safeguards to the highest value targets. Systems and IT administrators comprise a set of privileged users granted access to very high value targets. Read More ▶ | | | |
0 comments:
Post a Comment