marzo 23, 2018
Cyberbullying: if you have a tween or teen and haven’t workshopped this with your kids then you need to put a time in the diary now. Cyberbullying is one of the biggest challenges our children’s generation will face and unfortunately, it isn’t going away.
The recent tragic suicide of 14 year old Aussie girl Amy ‘Dolly’ Everett as a result of online bullying needs to be a wake-up call for parents. Many kids who are bullied online feel completely ashamed and publicly humiliated and can’t see a way past the embarrassment. They don’t have the skills to handle it and don’t know where to seek help. Yes, we are first-generation digital parents BUT we need to prioritise our children’s safety and well-being online. And sort this out FAST!
How Big An Issue Is Cyberbullying?
Aussie tweens/teens aged 12-16 are the primary targets of cyberbullying. 63% of the victims are girls.
In its 2016-17 annual report, the Office of the e-Safety Commissioner reveals an increase of 60% in the reported cases o..
marzo 22, 2018
We all love a good getaway, and as we look ahead to spring and summer, most of us are already planning our next vacation. To do that, we’ll tap one of the many online travel agencies out there to help us organize our plans. Only now, some travel-goers may have to stop trip planning so they can start planning for credit monitoring, as one of the most popular travel agencies, Orbitz.com, was hit with a data breach that may have exposed as many as 880,000 payment cards.
The online travel agency reported two separate data disclosures, as an attacker may have accessed customers’ personal information shared on Orbitz.com and a handful of associated websites between Jan. 1, 2016 between Dec. 22, 2016.
What’s more – in addition to the payment cards, hackers may have also stolen customers’ full name, date of birth, phone number, email address, physical and/or billing address and gender information. Now, with all this personal information potentially out in the open, it’s important affected cu..
marzo 22, 2018
In a technology-driven age, entrepreneurs, organizations, and nations succeed or fail in large part based on how effectively they develop, implement, and protect technology. One of the most notable aspects of “The Economic Impact of Cybercrime” report released recently is the prominence of cyber espionage, the cyber-theft of intellectual property (IP) and business confidential information. The report from the Center for Strategic and International Studies (CSIS) and McAfee estimates that the cost of cybercrime to the global economy is around $600 billion annually, or 0.8% of global GDP, and cyber espionage accounts for 25% of that damage, more than any other category of cybercrime. Furthermore, the report argues that “Internet connectivity has opened a vast terrain for cybercrime, and IP theft goes well beyond traditional areas of interest to governments, such as military technologies.”
When we think of cyber espionage, we tend to think of events such as the Chinese military’s theft o..
marzo 21, 2018
China is a region that has been targeted with mobile malware for over a decade, as malware authors there are continually looking at different tactics to lure victims. One of the most innovative tactics that we have come across in the past several years is to get victims to buy discounted devices from sellers that have compromised a smartphone. And now, one of these campaigns, Android.MobilePay (aka dubbed RottenSys) is making headlines, though McAfee has been aware of it for over two years. The tactic used by the author(s)/distributors is straightforward; they install fake apps on a device that pretend to provide a critical function, but often don’t get used.
RottenSys is stealthy. It doesn’t provide any secure Wi-Fi related service but is rather an advanced strain of malware that swoops almost all sensitive Android permissions to enable its malicious activities. In order to avoid detection, RottenSys doesn’t come with an initial malicious component and or immediately initiate malicio..
marzo 21, 2018
El Proyecto Xen se compone de un conjunto diverso de las empresas miembros y colaboradores que están comprometidos con el crecimiento y el éxito del Proyecto Xen Hypervisor. El Proyecto Xen Hypervisor es un elemento básico de la tecnología de servidor y proveedores de la nube, y está ganando tracción en el incrustados, de seguridad y de automoción espacio. Esta serie de publicaciones se destacan las empresas contribuir a los cambios y el crecimiento que se realizan para el Proyecto Xen, y cómo el Proyecto Xen tecnología refuerza su negocio.
Nombre: Yurii Konovalenko
Título: Gerente De Proyecto
Cuando comenzó a colaborar con el Proyecto Xen?
GlobalLogic comenzado a contribuir a que el Proyecto Xen en 2013. Desde ese momento, hemos hecho un importante trabajo para mejorar la funcionalidad general del Proyecto Xen con respecto a la incrustados mundo. Por ejemplo, nos trajo a la vida R_CAR de la plataforma de apoyo de Renesas.
¿Cómo contribuir a que el Proyecto Xen..
marzo 20, 2018
When you think of Endpoint Detection and Response (EDR) tools, do you envision a CSI-style crime lab with dozens of monitors and people with eagle eye views of what their users and defenses are doing? For many, the idea of EDR seems like something for “the big players” with teams of highly trained people. This is based on the historical products and presentations of these tools in days gone by however, it’s no longer true.
For starters, threats and the need to investigate them to prevent a repeat of an outbreak or breach. Malware and attack methods became smarter to put it simply and stopping them became much more difficult. Threats don’t always look like threats anymore. The same type of attack might arrive through the web, email, as a different file type with a different name but with the same intent: avoid detection and compromise your endpoints.
Defenses have evolved as well, but as part of that growth another problem grew with it. More defenses means more reports, ..
marzo 20, 2018
What do self-driving cars and interactive speakers have in common? Both utilize something called “machine learning.” This is when we give systems access to data that enables them to identify patterns and improve their performance, or “learn”, without human programming.
Machine learning is often confused with artificial intelligence (AI), where machines and applications mimic human behavior. Although they often work together, machine learning takes human-like behavior one step further—it enables systems to get smarter as they gain more information. This is why your Alexa speaker, for example, can make recommendations based on what you’ve said in the past.
To do this, computer systems need access to enough digital information to analyze, classify, and store information, and then make predictions. This is where the internet comes in. Even though the term “machine learning” was coined in 1959 by British AI pioneer Arthur Samuel, it wasn’t really possible until the internet was mature eno..