Archive

Intel Says ‘Tiger Lake’ Will Drown Control-Flow Malware

The next generation of Intel mobile processors will include malware protection built into the chip. The protection, provided by Intel's Control-Flow Enforcement Technology, will first be available in the company's "Tiger Lake" mobile processors. CET is designed to protect against the misuse of legit...

Amazon Brings Big Guns to Battle Against Counterfeit Products

Amazon has announced Project Zero, a program that empowers vendors to help drive counterfeits down. The anti-counterfeit campaign will employ Amazon's advanced technology, machine learning and innovation. Amazon will partner with Project Zero's participating vendors to protect their intellectual pro...

Google Assistant Gets More Features, Greater Reach

Google this week debuted a slew of new capabilities for Google Assistant at CES in Las Vegas. The new Connect platform lets device manufacturers incorporate Assistant into their products easily and cost-effectively. Connect uses Google's existing smart home platform to expand to new device types, wh...

EXPERT ADVICE

Mobile Phone Security: All You Need to Know

We rely on our phones to process and store reams of personal digital data. Our digital activities -- from checking bank balances to paying for a product with a tap of the screen, to sending friends and family messages over social media, to accessing work emails remotely -- have turned our phones int...

McAfee’s Upgraded Cloud Security Protects Containers

McAfee has introduced its Cloud Workload Security v5.1, which represents the first solution for open source containers. McAfee CWS v5.1 secures Docker workload and servers in public and private cloud environments by quarantining infected workloads and containers in a single click. "McAfee Cloud Work...

INSIGHTS

Digital Disruption

Andrew McAfee and Erik Brynjolfesson, who teach at MIT's Sloan School of Management, started writing about the impact of artificial intelligence and machine learning almost a decade ago. Their early books -- The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies a...

SentinelOne Debuts Unified OS Threat Protection

SentinelOne this week announced a partnership with Microsoft to bolster threat protection for mixed platform users, making computing safer for Linux machines in a multiplatform workplace. SentinelOne will integrate its Endpoint Protection Platform with Microsoft's Windows Defender Advanced Threat Pr...

INSIGHTS

The Vision Thing

Salesforce earlier this year introduced its Einstein Vision capability, an idea with a lot of promise but not a great deal of precedent. Who had applications that could see, and how would this be used? For decades, we've been content with scanning documents and analyzing them with optical character ...

INSIGHTS

Output vs. Outcomes

How many times have we been lulled into complacency over getting a project or a product done but not necessarily well received, because it was someone else's gig? This is a great reminder that the job isn't done simply because we produce something and shove it out the door. It's also a cue to pay cl...

Lenovo’s Yoga Book Aims for Top Shelf

Lenovo's recently unveiled 2-in-1, the Yoga Book, is available in Android Marshmallow and Windows 10 Home versions. Reviews have been mixed, with some praising its look and feel, but some considering its capabilities not up to scratch. Its Intel Atom processor doesn't provide enough power for a work...

SPOTLIGHT ON SECURITY

Bot Armies Boost Candidates’ Popularity on Twitter

Internet bots have many useful online purposes, but they have a dark side, too, as three researchers demonstrated in their analysis of Twitter traffic during the first presidential debate between Hillary Clinton and Donald Trump. Bots are used to automate functions on the Net. For example, if you be...

Insulin Pump Susceptible to Hacking

Medical device manufacturer Animas on Tuesday warned that its OneTouch Ping insulin pump system was susceptible to hacking. "We have been notified of a cybersecurity issue with the OneTouch Ping, specifically that a person could potentially gain unauthorized access to the pump through its unencrypte...

Angry Investor Aims to Kick Yahoo’s Board to the Curb

Starboard Value last week launched a proxy fight to replace the board at Yahoo, blasting the company's management and nominating its own slate of board members. One of Yahoo's largest investors, Starboard has a 1.7 percent stake worth about $570 million. It has been "extremely disappointed with Yaho...

INSIGHTS

2015: The Year of Intelligence

This year we traded in terminologies going from big data and analytics to digital disruption as the market-moving meme. I am not sure either one hits the spot, but they give me something to write about. Other things happened in 2015 too, but I'm just going to focus here. It seems to me we focus on t...

LinuxInsider Channels