It Archive
Hopefully your answers is “no”, and the intention of this blog is to keep you cyber safe in 2017. Remember the hack of the Ashley Madison site? The top 3 passwords used on that site were “123456”, “12345” and “password”. While there are no guarantees that malicious actors won’t get to your
Thanks to the ubiquitous smartphone, there’s now an entirely new level of marketing available: Geofencing. Geofencing is a location-based marketing tool that enables more active consumer focus. There are three ways to track a customer’s location: GPS, Bluetooth, and beacons, and each method finds and targets customers in different
Today concludes the five ‘Go’ matches played by AlphaGo, an AI system built by DeepMind and South Korean champion, Lee Sedol. AlphaGo managed to win the series of games 4-1. ‘Go’ is a strategy-led board game in which two players aim to gather and surround the most
Ofcom, BT and OpenReach – what this means to you BT used to like to tell us that “it’s good to talk”, but this morning it probably wasn’t the happiest of phone calls with the telecoms regulator Ofcom, which has told BT that it needs to seriously
A new piece of research has found that approaching half of all businesses have been hit by aransomware attack over the last year. The study from Malwarebytes questioned over 500 IT leaders from companies across the UK and Germany, as well as Canada and the US, and
But we wanted more: interactivity, responsiveness, perhaps even a little bit of bling. Flash made this happen, and animators and designers could create all the interactivity they wanted and wrap it up in a file that was inserted into the web page and downloaded on request. The
At one point, C-SPAN resorted to airing a stay Periscope feed from Rep. Scott Peters of California. it’s now not real of the contributors of Congress, who’ve became to social media tools to deliver a good deal–wanted visuals to the story. consultant Charles Rangel used Periscope to
Adobe has published new versions of Flash to patch a vulnerability being exploited right now by hackers to hijack PCs and Macs. The APSB16-10 update addresses a total of 24 CVE-listed flaws, including one (CVE-2016-1019) that’s been exploited in the wild to inject malware into Microsoft Windows
Intel today officially pulls the wraps off its mildly delayed Xeon E5 v4 server processors. These chips follow up 2014’s Xeon E5 v3 parts, which used a 22nm process size and the Haswellmicro-architecture. Intel shrunk Haswell to 14nm, and after some tinkering, codenamed the resulting design Broadwell.
Red Hat has cut the $99 price of its Linux developer subscription to zero, for penguins building cloud microservices using containers. The company today is expected to start giving away its Red Hat Enterprise Linux (RHEL) subscription for free as part of the existing Red