How the rich protect their online identity

You can’t always control what’s said about you on the Internet. But with enough money, you can influence what comes up in a search. “We can remove something that shouldn’t be there,” said Chris Dinota, the CEO and founder of Solvera Group. The cost for that service? Between $50,000 and $300,000, depending on the project, plus a monthly maintenance cost. While many less expensive services work to move negative content down and positive content up, Solvera will try to remove the negative links altogether and manage the search results. Dinota’s…

Read More

Google gets over 1,000 requests to takedown links

ECJ ruling sees demand from paedophiles, stalkers and attempted murderers to remove links about them Google has received over 1,000 requests by people asking to have links to information about them removed. The influx of demand comes after a European Court of Justice ruling on Tuesday. According to reports from Sky News, the search company has had demands to take down information from “a man who tried to kill his family” to a convicted cyber stalker requesting a story about him to be removed. Also asking to be forgotten have been…

Read More

Government opens accounts for assistance to flood victims

Belgrade, 16 May 2014 – The Serbian government has opened dinar and foreign currency accounts at which those who want to help victims of floods can deposit money. Foto: Tanjug The assistance to those in need can be paid to the dinar account 840-3546721-89, purpose of payment: removal of consequences of the emergency situation – floods. The number of the foreign currency account at which the assistance for the removal of consequences of the emergency situation can be deposited is 01-504619-100193230-000000-0000. Payment instructions from outside of Serbia are available here. Source:…

Read More

5 Ways to Secure Your Web Browser

Which is the most secure Web browser? Google Chrome? Mozilla Firefox? Microsoft’s Internet Explorer? It’s a simple question—but the answer is a bit complicated. In a Fall 2013 poll, security-conscious browser users overwhelmingly voted Firefox as the most secure. But during the annual Pwn2own hacking contest in March 2014, Firefox was exploited four times with zero-day attacks, making it one of the least secure browsers. To complicate matters further, a 2013 comparative analysis of five popular Web browsers by NSS Labs found that Internet Explorer outperformed its competitors. Even so, the NSS Labs research…

Read More

IDC Lowers IT Spending Forecasts Due to Emerging Markets and Mobile Device Slowdown

According to the just released International Data Corporation (IDC) Worldwide Black Book (Document # 248617), worldwide IT spending will increase by 4.1% in constant currency this year, down from IDC’s previous forecast of 4.6% and also down from last year’s growth of 4.5%.  According to the new report, IT spending has been volatile since the beginning of the year, with macroeconomic wild cards including the crisis in Ukraine and the slowdown in China adding to the general sense of uncertainty which continues to impact business confidence and investment. Pent-up demand should, however, drive…

Read More

Will Elon Musk fund a Nikola Tesla museum?

Inventor Nikola Tesla may have died alone and broke, but he has powerful friends who want to preserve his legacy. Cartoonist Matthew Inman, the brain behind “The Oatmeal,” is one. Using his popular web comic, Inman launched an effort to turn Tesla’s former laboratory in Shoreham, New York, into a museum. Tesla, who lived from 1856 to 1943, developed the basis for AC power, among other ideas and innovations that have shaped our lives. He obtained more than 100 patents, according to the Tesla Memorial Society of New York. Inman…

Read More

SPA publishes position on Tokenization and Protection of Card Data for Online Payments

Tokenization in payments has been around for years. However, in recent months tokenization has once again become a buzzword within the financial industry which is looking to add tokens to the list of alternative payment methods using card data (cloud-based accounts, mobile wallets, Google HCE). The SPA considers that what’s different this time round is the standardization efforts taking place for online payments using tokens (for example, EMVCo, US Clearing House and new ANSI X.9 standard, PCI-DSS) and the fact that these efforts are being aligned with upcoming legal frameworks…

Read More

Anti-DDoS servers used to launch DDoS attack

The attack threw around 25 million packets of data at the victim’s server per second Infrastructure designed to protect organisations against DDoS attacks has been subverted and used carry out out the attacks it was trying to stop on an unnamed online gaming company. The attack was launched from servers based in Canada and China. the servers themselves were part of an anti-DDoS protection system. The attack, discovered by IT security company Incapsula, was mounted on an online gaming company. At its peak, the attack threw around 25 million packets…

Read More

Heartbleed bug still a threat after flawed patches

Rush to patch Heartbleed bug causes sites to make dangerous errors The majority of sites that attempted to protect themselves against Heartbleed have ended up no better for it, while some are actually more vulnerable than before. Following Heartbleed’s reveal on 7 April, sites scrambled to patch their OpenSSL installations and revoke their old certificates. Now, data from a study conducted by Netcraft shows that many sites haven’t done enough to fully protect themselves from the bug. Some 30,000 sites revoked their old certificates but did not replace their private keys, according…

Read More

Free eBooks from Microsoft Press

Microsoft have available a handful of free-to-download ebooks which provide an introduction and information on some of their enterprise and development products, such as Windows Server, Azure, .NET, etc.  Some of these ebooks don’t contain the same level of technical detail that you’d usually find in your average IT manual (although some of these ebooks, such as the development related topics do) they do provide a enough detail for someone wanting an understanding of the features and functionality found within that particular software product and the associated technology set. Click here to visit the…

Read More
error: https://exclusivenews.ogledalo.rs- Content is protected !!