- Welcome Guest
- Sign In
A set of flaws in a widely used network communication protocol that could affect millions of devices has been discovered by security researchers. The nine vulnerabilities dramatically increase the attack surface of at least 100 million Internet of Things devices, exposing them to potential attacks t...
Linux began its life as a humble experiment in Unix porting, but from there it quickly became a popular kernel for server OSes due to its low cost and customizability. From there it morphed to power network appliances and Android, proving it was lean enough for a whole gamut of embedded systems. It'...
Canonical on Feb. 2 made available Ubuntu Core 20. This new Ubuntu Core version boasts notable new device security innovations. Given the increasing numbers and sophistication of attacks by individual and state-sponsored cybercriminals, Canonical's efforts should be welcomed by both IoT device maker...
While it was already underway prior to the pandemic, the worldwide shift to digital payments has been accelerated by the crisis. This new cashless concept and the related back-end changes by banks to adopt real-time payments are becoming increasingly popular; and have set into motion the potential f...
Maintaining and increasing research and development spending in the COVID-19 era is critical for high technology vendors to deliver new solutions and services, continue to innovate, and position their businesses to rebound from the negative effects of the global pandemic. Analysts, financial adviso...
The demand for smart home devices is projected to grow steadily over the next few years. Nonetheless, consumers should think carefully before making a purchase due to a trend of manufacturers phasing out "smart" products. While it does not look good when a smart device maker abandons a product line,...
An outlaw online network that's been used to infect millions of computers with ransomware has been disrupted by Microsoft. The company announced Monday that, together with telecommunications providers around the world, it was able to cut off the infrastructure used by the Trickbot botnet so it could...
The United States Defense Innovation Board has recommended that the Pentagon hire civilians to work from home who can handle classified information as a way of attracting people with technology expertise. The individuals sought "will have technical degrees and/or highly specialized skills in digital...
Surely spurred by the work-from-home necessities of 2020, people have connected a multitude of non-business devices to their corporate networks, making it progressively difficult to implement cybersecurity because every device is a potential weak point. So, who will ultimately be responsible for cyb...
Cloud technology has matured substantially during the past 15 years, and now a paradigm shift is taking place, away from legacy in-house IT business services, to a cloud-first technology-driven agile workplace. Here are five trends in cloud computing for organizations to consider when plotting an IT...
Qualcomm has announced its Robotics RB5 platform, with 5G and 4G connectivity, on-device AI and machine learning. The platform's Qualcomm QRB5165 processor, which is customized for robotics applications, offers a heterogeneous computing architecture coupled with the 5th-generation Qualcomm AI Engine...
One of the great joys of constantly checking out new or obscure Linux operating systems is finding some insane innovations that stand out from the crowded collection of distros. The current release of PsychOS Linux, code-named "Insane," possibly might blow your mind. This distro is really an off-the...
The Linux Foundation will host the Trust over IP Foundation, a cross-industry effort to ensure more secure data handling over the Internet. This new foundation is an independent project enabling trustworthy exchange and verification of data between any two parties on the Internet. The ToIP Foundatio...
How do you know if you are at risk of being hacked? Like conventional criminals, criminal hackers choose easy and lucrative targets. One group in the crosshairs is made up of companies that have data on millions of users, such as private sector entities with a Web presence. Why go after data one use...