Is there such a thing as a “good” hacker?

Hacked 1 300x171 Is there such a thing as a “good” hacker?In the coming year, there will be more intricate and complex data integrity attacks, with the main motivation being financial gain and/or political manipulation.

Private enterprises and public entities are looking for ways to better protect information and preserve the integrity of their data, while individuals want to ensure that the internet remains open and provides equal access to information to all. People are now being recognized as a powerful tool to solve these problems.

As a result, the negative perception surrounding hackers is shifting. Most large technology companies run notable bug bounty programs, including Google, Apple and Tesla. Recently the U.S. government added programs such as “HackthePentagon”and “HacktheArmy,” and the recent Department of Defense Vulnerability Disclosure Policy.

In ride the “Ethical Hackers” – the new white knights of the cybercrime world.

So. what makes a good hacker? Continue reading

Cyber criminals going old-school

Email Security Comtel Communications 150x150 Cyber criminals going old schoolComplex cyberattacks cost a cyber-criminal a fair amount of money to create and carry out. And the costs are only rising. This has prompted many to return to old-fashioned email tricks to bring in some needed cash.

Complex state-on-state cyberattacks and hacking tools like those revealed by Wikileaks (where the CIA can turn TVs into covert eavesdropping tools) are not going away, but you don’t have to be an elite programmer and hacker to make money using ransomware or simply stealing data. Email can be used expediently and effectively.

Continue reading

Will This New Battery Revolutionize Our Phones and Cars?

battery 23999 640 174x300 Will This New Battery Revolutionize Our Phones and Cars?The co-inventor of the lithium-ion battery says he has developed a safer battery that lasts three times longer than those currently in use in our mobile devices and many newer electric cars.

In research published in the March edition of the journal Energy & Environmental Science, and in a filing with the U.S. Patent and Trademark Office, John Goodenough and colleagues at the University of Texas report that their new battery technology could produce a safe, non-explosive cell with charging times measured in minutes, not hours.

Continue reading

How Down Time affects Enterprises

Veeam® commissioned a survey over 1,000 global IT decision makers to gain a better understanding the impacts service Availability has on enterprises.

Overall, there appears to be an alarming amount of under-protected and unrecoverable data in organizations that costs, on average, $21.8M each year due to downtime.  This reflects a as a 36% increase YOY – a move in the wrong direction. Enterprises must start accelerating their implementation of data protection solutions to reduce lost time and money.

availability report 2017 infographic How Down Time affects Enterprises

How to decide between on-premise, cloud hybrid or multi-cloud

should our business use cloud computing 300x183 How to decide between on premise, cloud hybrid or multi cloudWith so many options for data storage and hosted or on-premises solutions, how does a business choose the right one?

Deciding how and whether to use cloud computing isn’t a simple flip of a coin. It’s made all the more complicated by an overwhelming number of vendors and products. After years of deploying each method – on premise, cloud, hybrid or multi-cloud – and then evaluating which worked and which didn’t, experts have deciphered what situations tip the scale toward one approach or another.  While the context is data storage, this analysis applies to most enterprise IT scenarios. Continue reading

Will the cloud save big data?

clouds 978964 640 Will the cloud save big data?Employees up and down the value chain are eager to dive into big data, hunting for golden nuggets of intelligence to help them make smarter decisions, grow customer relationships and improve business efficiency. To do this, they’ve been faced with a dizzying array of technologies – from open source projects to commercial software products – as they try to wrestle big data to the ground.

Continue reading

Our 9-1-1 system is vulnerable to attack

911 150x150 Our 9 1 1 system is vulnerable to attackA telephony denial of service (TDoS) attack is a specific type of DDoS attack that originates from or is directed towards a telephone system with the intent of bringing down the targeted system. These attacks commonly focus on commercial businesses and may often include ransomware requests. In reality, these attacks can affect anyone, including our nation’s 911 infrastructure, because even it is not isolated from or immune from these types of attacks. And based on its mission, in many ways, it is more fragile. Continue reading

10 Great Tech Gifts for the New Grad

Whether they’re just finishing high school and gearing up for college, or wrapping up a long sought-after Ph.D, the students in your life deserve some celebrating. And while cold, hard cash is often the graduation gift of choice, if you want to be certain your present isn’t blown in a post-finals bender, you’re advised to give something that requires wrapping paper.

These 10 tech-centric presents are great for students past, present, and future, not only because they keep them connected, concentrating, and curious, but because they’re fun, too. Continue reading