Archives by date

You are browsing the site archives by date.

NASA hacked because of unauthorized Raspberry Pi connected to its network

This low-angle self-portrait of NASA’s Curiosity Mars rover shows the vehicle at the site from which it reached down to drill into a rock target called “Buckskin.” The MAHLI camera on Curiosity’s robotic arm took multiple images on Aug. 5, 2015, that were stitched together into this selfie. NASA/JPL-Caltech/MSSS A report published this week by the NASA Office of Inspector… Read more →

Getting your corporate data ready for prescriptive analytics: data quantity and quality in equal measures

How to Win with Prescriptive Analytics In this ZDNet special report, we examine how you set up an analytics infrastructure that sees around corners and gives you options to avoid a head-on crash. Prescriptive analytics is nothing short of automating your business. This was the silver lining as we explored the complexities of prescriptive analytics in our guide. While a… Read more →

Microsoft’s new Windows Terminal is close to release in the Store

Credit: Microsoft At Build 2019 in May, Microsoft announced Windows Terminal, a terminal application for developers who use Command Prompt, PowerShell and the Windows 10 Windows Subsystem for Linux. On June 21, a listing for the preview version of Windows Terminal appeared in the Microsoft Store. But for now, a working version is not available to the public — at… Read more →

Free proxy service found running on top of 2,600+ hacked WordPress sites

A website offering both free and commercial proxy servers is actually running on top of a giant botnet of hacked WordPress sites, security researchers from Netlab, a network threat hunting unit of Chinese cyber-security giant Qihoo 360, have revealed. In a report published today, Netlab researchers accused the proxy service of masquerading as a front for a criminal operation…. Read more →

OpenSSH gets protection against attacks like Spectre, Meltdown, Rowhammer, and Rambleed

The OpenSSH project is getting protection against side-channel attacks that are known to leak data from a computer’s memory, and allow malicious threat actors to steal sensitive information. The protections were added to the OpenSSH code yesterday, June 20, by Damien Miller, a Google security researcher, and one of the top OpenSSH and OpenBSD developers. OpenSSH to encrypt private keys… Read more →

Google Docs help: How to restore your original version after collaborators make a mess

Here’s the scenario. You spend three days writing a truly excellent document. You research it carefully, you base it on the outline you and your team agreed upon, and you do a strong edit pass before sharing it. CNET: G Suite: Everything you need to know before signing up for Google’s office suite Then, you share it with your team…. Read more →

IBM, Cloudera forge strategic pact

How to win with prescriptive analytics Analytics has evolved from the basics — visualizations, historicals and dashboards — to the more complex with recommendations and predictions of outcomes. Now it’s time to step it up and get prescriptive. Read More IBM and Cloudera outlined a strategic partnership where the two companies will co-sell big data applications. Big Blue and Hortonworks… Read more →

Amazon patent reveals drone surveillance as a service

How Google and Amazon capture IoT data from their hubs Tonya Hall talks to Tom Hulsebosch, senior managing director at West Monroe Partners, about how Google and Amazon are able to capture IoT data from their hubs. A new patent granted to Amazon suggests the retail giant is exploring ways in which drone surveillance could be packaged up as a… Read more →

Trade war prompts Apple to reconsider Chinese supply chain

Potential battery fires force Apple to recall 2015 15-inch MacBook Pros Laptops labelled mid-2015 to be sent away for a fortnight. Apple is reportedly considering a shift in hardware production from China in light of the ongoing trade battle between the United States and the country. According to the Nikkei Asian Review, the iPad and iPhone maker has asked major… Read more →

Travelers kinda hate robots at airports

Ever seen a robot at an airport? LaGuardia has one. Munich’s is called (wait for it) … Josie Pepper. From Amsterdam to Adelaide, they’re cropping up to help give travelers a more seamless flying experience. In fact, automation of all sorts is popping up at airports. Automated ticket counters has given way to high tech autonomous security and robots that… Read more →

This botnet exploits Android Debug Bridge to mine cryptocurrency on your device

Emotet is this year’s big malicious threat to your users The banking trojan turned botnet accounts for almost two-thirds of all malware payloads delivered by email – with malicious URLs favoured far more than weaponised attachments. A new botnet is making the rounds by abusing Android Debug Bridge (ADB) and SSH to enslave new Android devices to its network. The… Read more →

New Bird Miner malware targets Mac pirates

How to build trust in cryptocurrency Bill Barhydte, founder and CEO of ABRA, tells Tonya Hall why it’s important to build trust in cryptocurrency in order to improve access to global financial markets with cryptocurrency. A new variant of cryptocurrency mining malware called Bird Miner designed for Apple Mac is targeting users of pirated software. While cryptocurrency mining malware, also… Read more →