Posts by Dan

IT Security: Will A.I. usher in a new era of hacking?

IT Security: Will A.I. usher in a new era of hacking?

Machine vs. machine might be the future of cyber warfare, experts say It may take several years or even decades,...

IT Security: Holiday shopping by mobile phone? Beware fake apps and bad Wi-Fi hotspots

IT Security: Holiday shopping by mobile phone? Beware fake apps and bad Wi-Fi hotspots

“Buyer beware” takes on added urgency with more smartphone purchases on Black Friday Black Friday holiday shoppers using smartphones should...

IT Solutions: The top reasons for network downtime

IT Solutions: The top reasons for network downtime

Network outages linked to human error, incompatible changes, greater complexity New research paints a somewhat bleak picture of network performance....

IT Solutions: Research chip modeled after the brain aims to bring smarts to computers

IT Solutions: Research chip modeled after the brain aims to bring smarts to computers

Researchers at the University of Tennessee, Knoxville, create a neuromorphic chip with off-the-shelf components The dream of creating intelligent computers...

IT Security: Malware attack starts with a fake customer-service call

IT Security: Malware attack starts with a fake customer-service call

The hackers call hotels, then send email attachments that look like customer information Hotel and restaurant chains, beware. A notorious...

IT Security: 412 million FriendFinder Network accounts said to be exposed in hack

IT Security: 412 million FriendFinder Network accounts said to be exposed in hack

Over 412 million accounts over six sites were affected Over 412 million accounts on dating and entertainment network FriendFinder Networks...

IT Security: Hacker shows how easy it is to take over a city’s public Wi-Fi network

IT Security: Hacker shows how easy it is to take over a city’s public Wi-Fi network

A buffer overflow in a single router model could have endangered thousands of Wi-Fi users In a perfect example of...

IT Security: Hackers can abuse LTE protocols to knock phones off networks

IT Security: Hackers can abuse LTE protocols to knock phones off networks

Attacks on the global mobile interconnection network are still possible even with the new LTE Diameter protocol, researchers say When...

IT Solutions: 5 things you need to know about virtual private networks

IT Solutions: 5 things you need to know about virtual private networks

VPNs are important for both enterprise and consumer security A virtual private network is a secure tunnel between two or...

IT Security: China passes controversial cybersecurity law

IT Security: China passes controversial cybersecurity law

The new law that tightens China’s control over the internet could impact foreign companies China has passed a new cybersecurity...

1 3 4 5 6 7 15