It’s Time for Open, Shared Home Wi-Fi

Apple co-founder Steve Jobs loved to walk around his neighborhood in Palo Alto, California. And after his pride and joy, the iPhone, was born, he naturally took it along with him on walks. The first iPhone had a lousy, sluggish, cellular-data network, but it also had a much faster data option: Wi-Fi. It even had a feature (still present, but much less touted) that popped up a list of nearby Wi-Fi networks on the screen, so you could always find one in range. But, he once told me, there was…

Read More

Working with public cloud: How to tackle the challenges

As the take-up of public cloud services grows, so organisations are figuring out how to fit these services into their existing IT infrastructure and business processes. Despite the many attractions of on-demand utility computing from an external provider, integrating these services can throw up a mess of technical, regulatory, licensing, billing and other complications for firms. Here are some of the approaches that major organisations have taken to managing a mix of in-house and public cloud services. The public cloud: What is it good for? Public cloud is all about…

Read More

4 Tips: Protect Government Data From Mobile Malware

Mobile malware continues to proliferate, particularly on Android devices. These four steps help counter the threat. It often happens without you knowing. Malware takes over your smartphone or tablet, exploiting vulnerabilities and trolling for information. Perhaps the processing speed on your smartphone slows down. Or a preview of a text message that you didn’t write temporarily pops up on your screen. These and other clues lead you to become suspicious that someone has access to your device and data. Fake ID on Android The recent disclosure of a new Fake ID malware…

Read More

Microsoft must hand over overseas data, US court rules

Software giant to appeal ruling asking it to hand over data from its Irish datacentre Microsoft has lost another bid to have a US government warrant demanding access to emails stored in its Dublin-based datacentre overturned. The company has been ordered to hand over the emails to law enforcers in the US as part of a criminal investigation, the details of which have not been disclosed at this time. US district judge Loretta Preska has ruled that Microsoft must hand over the data, even though it’s stored in a country…

Read More

Are you under threat from the head of the IoT?

Mark Samuels ponders what the latest job title du jour means for those currently tasked with their firm’s digital strategy If you think the position of chief digital officer (CDO) is pointless, then another job title has emerged that takes superfluous senior IT roles to a whole new level. All hail the head of the Internet of Things (IoT), a new executive position for the technology industry’s latest trend. The concept of IoT refers to the interconnection of internet-enabled objects and devices – and research suggests the trend is going…

Read More

16.37% of Users Still Run Windows XP, Kaspersky Lab Statistics Say

More than 16% of all PC users who agreed to provide data to the distributed global Kaspersky Security Network were still working on computers running Windows XP in June 2014. This fact carries potential implications for information security. This number was part of the findings from the “Windows usage and vulnerabilities research” carried out by Kaspersky Lab experts in the summer of 2014. Users whose computers run under a dated operating system or have out-of-date versions of installed software risk coming under attack from malware that exploits vulnerabilities. The study…

Read More

Kaspersky Lab: Keep online accounts safe with secure passwords

Internet is being used nowadays for a wide range of activities, including online banking, online shopping, online research and also for socialization purposes. In the last few years there’s been a massive growth in the number of social networking sites such as Facebook, MySpace, etc., where users can share all kinds of personal details as well as music, pictures, and videos. Unfortunately, the more personal details users make available online, the more exposed they are to online identify theft. Identity theft is when a criminal steals confidential personal data that…

Read More

Can you really do it all in the cloud? No way, say tech chiefs

Cloud computing is still too risky for CIOs to gamble on putting all enterprise applications out there. Although more and more organisations are experimenting with cloud-based applications, tech chiefs remain extremely cautious about putting mission-critical applications into the cloud, citing security, cost and reliability among their key considerations. 92 percent say ‘no’ When asked “Is it now a realistic possibility to run all the applications a business needs through the cloud?” the ZDNet/TechRepublic CIO Jury of tech decision makers responded with resounding ‘no’ by a margin of 11 to one.…

Read More

Ericsson Connected Vehicle Cloud wins 2014 Mobile Innovation Award

Ericsson announced that Ericsson Connected Vehicle Cloud has been awarded the most innovative use of M2M technology that incorporates mobile communications, at the 2014 Mobile Innovation Awards. The awards are to recognize new developments and achievements in the fast moving European, Middle East and African (EMEA) mobile solutions sector. Drivers and passengers can now detect vehicle repair issues, automatically book service appointments, subscribe to in-vehicle Wi-Fi and gain on-demand infotainment. Ericsson Connected Vehicle Cloud builds on today’s telecom network capabilities and delivers dramatically improved quality of experience, creating new business…

Read More

Crouching Yeti: an ongoing spying campaign with 2 800+ highly valuable targets worldwide

New malicious tools, an expanded list of victims, and other features related to the Crouching Yeti campaign, also known as Energetic Bear. Kaspersky Lab announces the release of comprehensive in-depth analysis of the malware and command and control (C&C) server infrastructure related to the cyber-espionage campaign known to the company’s Global Research and Analysis Team (GReAT) as the Crouching Yeti. The campaign’s origins go back as far as to the end of 2010; while today it is most definitely still alive – and targeting new victims on a daily basis. Nicolas…

Read More
error: https://exclusivenews.ogledalo.rs- Content is protected !!