Archives by date

You are browsing the site archives by date.

Whether Working or Job Seeking, the Algorithm Is Watching

To save articles or get newsletters, alerts or recommendations – all free. Don’t have an account yet?Create an account » Subscribed through iTunes and need an NYTimes.com account?Learn more » Source Article from http://bits.blogs.nytimes.com/2014/12/28/whether-working-or-job-seeking-the-algorithm-is-watching/

Geek lit: Microsoft’s Mark Russinovich and his Rogue Code

Earlier this year, Mark Russinovich, a Microsoft Technical Fellow who works on Azure, released Rogue Code – but not rogue code. It’s the third techno-thriller in a trilogy based on Jeff Aiken, the main character in Zero Day and Trojan Horse. Each book is based on computer-related threats to modern society. The main ones in Rogue Code are rootkits and… Read more →

2014 in security: The biggest hacks, leaks, and data breaches

2014 in security: The biggest hacks, leaks, and data breaches Source Article from http://www.zdnet.com/pictures/2014-in-security-the-biggest-hacks-leaks-and-data-breaches/#ftag=RSSbaffb682014 in security: The biggest hacks, leaks, and data breacheshttp://www.zdnet.com/pictures/2014-in-security-the-biggest-hacks-leaks-and-data-breaches/#ftag=RSSbaffb68http://www.zdnet.com/blog/rss.xmlLatest blogs for ZDNetLatest blogs for ZDNethttp://i.zdnet.com/images/spry/zdnet_300x300.jpg

North Korea denies hacking South’s nuclear power operator

North Korea has refuted allegations it was involved in a recent spate of cyberattacks against South Korea’s nuclear power operator, demanding Seoul produce evidence to back its accusations. State-run Korea Hydro & Nuclear Power had experienced several hacking attacks over the past week, during which documents were stolen and operating manuals for nuclear reactors were published online. The incidents triggered… Read more →

My top 10 predictions for 2015, by @SDenecken

Time to spend a good cup of coffee on a Sunday with snow outside and think ahead about things to come in 2015. But in good tradition, lets start to recap 2014´s top predictions and see what did come in to play… From 2014, clearly most of my predictions about Cloud is business – Cloud enables agility and business innovation… Read more →

A Google Gentrification Fight That Doesn’t Involve San Francisco

To save articles or get newsletters, alerts or recommendations – all free. Don’t have an account yet?Create an account » Subscribed through iTunes and need an NYTimes.com account?Learn more » Source Article from http://bits.blogs.nytimes.com/2014/12/28/a-google-gentrification-fight-that-doesnt-involve-san-francisco/

​Bad, bad Internet news: Internet Systems Consortium site hacked

Remember how just last week I told all you dedicated system and network administrators that you weren’t going to be starting your holiday weekend early because of a serious NTP security hole? Well, turn your car around and head back to the server room. The Internet Systems Consortium (ISC) has taken the site down for maintenance because they “believe we… Read more →

Tor users ‘not at risk’ after failed attack by PlayStation, Xbox Live hackers

Tor network amid the attack by Lizard Squad hackers (Image: Nadim Kobeissi/Twitter) Tor, the anonymity network, is recovering this weekend after it was targeted by hackers. The peer-to-peer network designed to keep users’ and their activities anonymous from state surveillance was the subject of an attack, said to be launched by the same hackers who brought down Sony’s PlayStation Network… Read more →

Tor users ‘not at risk’ after failed attack by PlayStation, Xbox Live hackers

Tor network amid the attack by Lizard Squad hackers (Image: Nadim Kobeissi/Twitter) Tor, the anonymity network, is recovering this weekend after it was targeted by hackers. The peer-to-peer network designed to keep users’ and their activities anonymous from state surveillance was the subject of an attack, said to be launched by the same hackers who brought down Sony’s PlayStation Network… Read more →