Posts by Dan

IT Solutions: Wi-Fi vs. LTE could be the start of a mobile rollercoaster

IT Solutions: Wi-Fi vs. LTE could be the start of a mobile rollercoaster

More mobile services will start sharing spectrum, so your speeds could vary more The long fight over LTE networks sharing...

IT Security: Encrypted communications could have an undetectable backdoor

IT Security: Encrypted communications could have an undetectable backdoor

Researchers warn about the use of standardized or hard-coded primes in existing cryptosystems Researchers warn that many 1024-bit keys used...

IT Solutions: Wireless power systems could one day beam electricity from space

IT Solutions: Wireless power systems could one day beam electricity from space

Researchers continue to push power transmission boundaries, but a lot of work remains Forget smartphone charging. When it comes to...

IT Security: Here’s how companies can deal with insider data theft

IT Security: Here’s how companies can deal with insider data theft

To learn that your company’s confidential data was stolen — not by any hacker, but by an employee — is...

IT Solutions: Business transformation proves to be catalyst for cybersecurity spending

IT Solutions: Business transformation proves to be catalyst for cybersecurity spending

Evolving risks and business technologies shift focus in security budgets As enterprises accelerate their use of cloud computing, online services,...

IT Security: Cerber ransomware kills processes needed to access data

IT Security: Cerber ransomware kills processes needed to access data

The program tries to terminate common database-related processes like those of the MySQL, Oracle and Microsoft SQL servers In order...

IT Solutions: IoT botnet highlights the dangers of default passwords

IT Solutions: IoT botnet highlights the dangers of default passwords

A botnet responsible for a massive DDOS (distributed denial-of-service) attack was created thanks to weak default usernames and passwords found...

IT Security: IoT malware behind record DDoS attack is now available to all hackers

IT Security: IoT malware behind record DDoS attack is now available to all hackers

The Mirai trojan enslaved over 380,000 IoT devices, its creator claims The source code for a trojan program that infected...

IT Security: Ransomware spreads through weak remote desktop credentials

IT Security: Ransomware spreads through weak remote desktop credentials

A new ransomware program in Brazil uses RDP brute-force attacks to infect hospitals Stolen or weak remote desktop credentials are...

IT Solutions: Researchers make progress toward computer video recognition

IT Solutions: Researchers make progress toward computer video recognition

Video recognition could give robots the equivalent of a human eye and allow them to do mundane tasks like laundry...

1 5 6 7 8 9 15