Facebook, Google, Twitter lax on terrorists’ misuse of their sites, say UK MPs

A panel of U.K. lawmakers has described as “alarming” that social networking companies like Facebook, Twitter and Google's YouTube have teams of only a few hundred employees to monitor billions of accounts for extremist content.“These companies are hiding behind their supranational legal status to pass the parcel of responsibility and refusing to act responsibly in case they damage their brands,” said a report released early Thursday in the U.K. by the Home Affairs Committee appointed by the House of Commons.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 10:38 pm

Passwords stolen from Mail.Ru were old, the company says

The 25 million account passwords stolen from Mail.Ru in a recently discovered hack were old and invalid, the Russian internet company said Wednesday.“The security of our users wasn’t compromised in any way,” a Mail.Ru spokeswoman said in an interview.The hack targeted forums for game projects that the company has acquired over the years. These include subdomains at cfire.mail.ru, parapa.mail.ru and tanks.mail.ru. Hackers stole passwords of users who participated in the forums.However, the company said the stolen passwords were legacy data. None of them were related to current email accounts or other Mail.Ru services.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 7:07 pm

This Android botnet relies on Twitter for its commands

Twitter users aren’t the only ones checking the microblogging service for important updates. Android malware is starting to do so, too.One maker of Android malware is using Twitter to communicate with infected smartphones, according to security firm ESET.The company discovered the feature in a malicious app called Android/Twitoor. It runs as a backdoor virus that can secretly install other malware on a phone.Typically, the makers of Android malware control their infected smartphones from servers. Commands sent from those servers can create a botnet of compromised phones and tell the malware on all the phones what to do.The makers of Android/Twitoor decided to use Twitter instead of servers to communicate with the infected phones. The malware routinely checks certain Twitter accounts and reads the encrypted posts to get its operating commands.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 5:58 pm

Linux at 25: A retrospective

What a long, strange 25 years it’s beenImage by Reuters: USA Today Sports/Baz Ratner, WikimediaFrom its obscure origins to its present primacy, Linux is now old enough to rent a car without having to pay extra for insurance. It has also been described as the “the greatest shared technology asset in history,” and it’s the chassis upon which a sizeable proportion of all the software on the planet is built. Here’s a quick look back at Linux’s history.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 5:09 pm

Why are SD-WANs taking off? Because they are secure, affordable and easy to use

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Software-defined Wide Area Networking is red hot.  It is safe to assume that, going forward, every multi-location business will rely on SD-WAN for a cost-effective, high-quality, unified network solution.In fact, IDC recently released a report predicting SD-WAN revenue will reach $6 billion in 2020. Why?  Because SD-WANs are secure, affordable and easy-to-use. Those three magic words are enough to turn any CEO’s head, and the benefits go well beyond that. SD-WANs address a confluence of issues that multi-location businesses are facing right now.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 3:55 pm

55% off Akface Smart Wifi Power Plug - Deal Alert

This smart plug from Akface allows you to remotely turn appliances and electronics on or off from anywhere in the world. Perfect for household appliances, lamps, window a/c units, and more. After connecting this plug to your house's wifi, you can easily control on/off, program the plug to follow an on/off schedule, and more. Currently averaging 4 out of 5 stars on Amazon (read reviews), the typical list price of $50.99 has been reduced 55% to $22.89. To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 3:14 pm

When your government hacks you

There was a time when Cisco routers were unstoppable, and their deviations into proprietary protocols and constructions were accepted because Cisco could do no wrong. They were the smartest kids in networking protocols.But there is a crack in their armor, a glitch in the Teflon. Cisco may not be the only networking infrastructure vendor to now face an attack ostensibly from their own government, just the largest.Just as the U.S. government has taken Huwaei to task for an accusation of hidden code benefiting the Chinese government, other governments across the planet now know that their Cisco infrastructure can be cracked open—and no, it’s not easy, and requires an additional step of having hacked in from some place else.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 3:01 pm

Minimize Windows 10 migration headaches by freeing data from devices

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Organizations and consumers are adopting Windows 10 at record rates. Nearly 350 million devices will be upgraded in the first year of release, with millions more after that. While the security, management, and mobility improvements in Windows 10 have already propelled some organizations to proceed with an upgrade, the end of Windows 7 support in January 2020 is a looming deadline for all.Operating system migrations require detailed planning, as every part of the end-user computing “stack” – hardware, applications, data, and user profiles -- needs to be assessed before proceeding. From an organizational productivity standpoint, maintaining the availability of the data people need to do their jobs is a top concern. To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 2:03 pm

Google is using AI to compress images better than JPEG

Small is beautiful, as the old saying goes, and nowhere is that more true than in media files. Compressed images are considerably easier to transmit and store than uncompressed ones are, and now Google is using neural networks to beat JPEG at the compression game.Google began by taking a random sample of 6 million 1280×720 images on the web. It then broke those down into nonoverlapping 32×32 tiles and zeroed in on 100 of those with the worst compression ratios. The goal there, essentially, was to focus on improving performance on the "hardest-to-compress" data, because it's bound to be easier to succeed on the rest.The researchers then used the TensorFlow machine-learning system Google open-sourced last year to train a set of experimental neural network architectures. They used one million steps to train them and then collected a series of technical metrics to find which training models produced the best-compressed results.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 1:23 pm

Hackers tap vBulletin vulnerability to break into 27 million more accounts

A vulnerability in a widely-used internet forum software is becoming a go-to method for hackers to steal data. Hackers recently targeted 11 different sites, many of them from Russia, and stole information from more 27 million Internet accounts, according to LeakedSource, a repository for data breaches.   About 25 million accounts of those accounts were from cfire.mail.ru, parapa.mail.ru, and tanks.mail.ru, all of them Russian language games. Another 1 million were tied to gaming titles from Funcom, including The Secret World and Age of Conan. The stolen data includes email addresses and hashed passwords that can be easily cracked.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 1:17 pm

71% off Venstar Bicycle Waterproof Sport Bluetooth Speaker with Remote Control - Deal Alert

The Venstar Waterproof Sport Bluetooth Speaker has been designed for bicycling and outdoor sports. Enjoy music when you are riding on road or climbing a mountain.  Excellent TPU material provides shockproof capability. The companion remote conrtol allows you to control the volume, skip to the next track or answer a call at the press of a button.  This bicycle speaker currently receives 4.5 out of 5 stars on Amazon (read reviews). Amazon indicates that it's typical list price of $159.99 has been reduced 71% to $45.99.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 1:09 pm

Microsoft reveals the chip behind HoloLens

Microsoft has talked up its well-regarded virtual reality headset called HoloLens, but has been a little stingy on some technical details, such as what's powering the device.However, it finally took the wraps off that mystery at an appropriate show. Microsoft detailed for the first time its custom CPU for HoloLens at Hot Chips, an annual semiconductor conference held at Stanford University every August.Hot Chips is a great show, and I miss attending it even more than IDF, since a variety of chip vendors show up to talk. Between the extreme technical detail from Ph.D. engineers and some brutal accents, it requires your full attention, but that's not a hard thing to do because the insights are often fascinating.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 1:09 pm

How Moto Mods went from concept to product

The Moto Z and Moto Mods announcement last month caught the attention of everyone who has followed modular phone designs like Google Project ARA. The intriguing Moto Mods are the most viable modular design yet because consumers can add features to their phones, simply and cleanly without stressing them with a complex interconnection procedure or having to wait for the phone to reboot. The magnetic interface intuitively explains how it works and guides the user the first time a Mod is added to the Moto Z.I sat down with Paul Fordham, lead mechanical architect on the Moto Mods design team at Motorola, to talk about how Moto Mods were conceived and developed into a product. Interviewing software and electrical engineers can be tedious because of the high level of abstraction in their work. It was a pleasure to talk with Fordham, however, because mechanical engineers, like physicists, are tethered to the physical world, making for a very enjoyable and tangible conversation.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 12:48 pm

Telegram's encryption stymies French police but pleases their bosses

French government officials have been revealed as fervent users of Telegram, a messaging app that is frustrating their interior minister with its end-to-end encryption.Telegram's fans include the current head of the French judicial police, Christian Sainte, and his predecessor, Frédéric Péchenard. The app's security has also won over a number of legislators, including the French finance minister, who encourages his team to use it, according to Wednesday's edition of French newspaper Le Canard Enchainé.Telegram claims over 100 million monthly users of its secure messaging app, but it was the action of just one of them -- Normandy church attacker Adel Kermiche -- that prompted French interior minister Bernard Cazeneuve to call on Tuesday for investigators to be allowed to eavesdrop on Telegram users' conversations.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 12:38 pm

When it comes to the iPhone’s headphone jack: I’m with Woz!

Apple co-founder Steve Wozniak may be a beloved figure in Silicon Valley, but he hasn’t had a big voice in Apple product decisions in a long, long time. And right now, that seems like a shame, as Woz is absolutely right to object to Apple’s widely reported plans to eliminate the headphone jack in the next model iPhone.+ Also on Network World: iPhone 7: Why abandoning the headphone jack makes sense +Wozniak told the Australian Financial Review this week, that if the iPhone 7 is “missing the 3.5mm earphone jack, that's going to tick off a lot of people.” And Wozniak doesn’t believe Bluetooth wireless connections—which work with a wide variety of devices—are the answer, claiming Bluetooth doesn’t sound as good as a wired connection.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 12:24 pm

French submarine builder's documents leak: A case of hacking for economic espionage?

DCNS, a French submarine builder, has allegedly been hacked—potentially for economic espionage reasons—and 22,400 pages of “secret” documents pertaining to its Scorpene-class submarine have been leaked.The Australian published redacted portions of the leaked documents, claiming to have seen thousands of pages outlining highly sensitive details about systems, sensors, specifications, tech manuals, stealth capabilities, antennae models, electromagnetic and infrared data, conditions under which the periscope can be used and more. The leaked documents reportedly detail “the entire secret combat capability of the six Scorpene-class submarines that French shipbuilder DCNS has designed for the Indian Navy.”To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 11:59 am

Startup IDVector anonymizes like Tor

A pair of former defense industry cyber security contractors is launching IDVector, a service that creates encrypted connections through an anonymizing network to shield users’ locations and to protect their machines from internet-borne attacks.IDVector Network passes customer traffic through a multi-node encrypted path before dropping it onto the open internet at locations removed from customers’ actual geographical locations.That tunneling makes it difficult for eavesdroppers to snoop content and identify where customers are located, making it possible for customers to use public Wi-Fi safely, say the company’s founders, CEO Ben Baumgartner and CTO Andrew Boyce.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 11:48 am

24% off Bose SoundSport in-ear headphones - Apple devices, Power Red - Deal Alert

Bose Sound Sport in-ear headphones deliver deep, clear sound for the music you love, with a durable design that stands up to the rigors of your day. Exclusive TriPort technology provides crisp highs and natural-sounding lows, while acoustic ports are positioned to resist sweat and weather, and hydrophobic cloth keeps moisture out. Proprietary Stay Hear tips conform to your ears' shape, so they stay comfortably in place all day long.  The Bose Soundpsort earbuds  currently averages 4 out of 5 stars on Amazon from 1,200+ people (read reviews) and  the Power Red model is currently discounted on Amazon from its its list price of $129.95 has been reduced to $99.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 11:24 am

IDG Contributor Network: Simulations you can expect in Cisco's ICND1 exam

Cisco is pretty clear on what you might need to configure in their new Interconnecting Cisco Networking Devices Part 1 (ICND1) exam. When you look at the exam blueprint, they use the language configure, verify and troubleshoot as opposed to just describe.What does this list of possible configuration topics look like? Here you go!  IPv4 addressing IPv6 addressing Pv6 stateless address auto configuration VLANs (normal range) spanning multiple switches Interswitch connectivity Layer 2 protocols (CDP, LLDP) Port security Inter-VLAN routingTo read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 11:09 am

9 top tools for corporate cloud collaboration

The nature of work has evolved rapidly during the last few years. Modern coworkers often have very different roles and responsibilities, and many work from multiple locations. Email is no longer an efficient tool for many of the tasks today's professionals perform, and face-to-face meetings are increasingly a rarity.Fortunately, a new generation of cloud-based collaboration tools are now available to help tackle some of these challenges. Here's a look at nine of the best options.1. Toggl for time tracking If you've been turned off by the complexity of past time-tracking solutions, Toggl may be a better fit. The great-looking time tracker works in a web browser, and it's an intuitive tool that helps monitor your productivity. Toggl works offline, too, and it automatically syncs time tracked offline the next time it connects to the web.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 10:07 am

What you need to do to stop data from leaving with exiting employees

It may come as a surprise, but more likely than not, when employees leave a company they’re taking company data with them. While it’s not always out of malicious intent, the amount of unprotected company information that walks out the door can result in bigger losses in the future.Biscom’s national study around data in the workplace revealed that more than one in four employees leave their job with company data. The study spotlights employees as a big security vulnerability to business data. To help prevent this, Bill Ho, CEO of Biscom, offers a few tips to minimize this threat.1. Establish clear employee policies on handling company data and informationTo read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 10:03 am

IDG Contributor Network: How bad is enterprise software? Really, really bad. But it's not quite that simple.

There is a bit of a standing joke in the technology industry that revolves around enterprise software, the software that the largest organizations in the world use to run their core processes. While these solutions are robust and secure, the joke tends to be it's at the expense of the users, who often complain about poor user experience, inflexibility and essentially having to change the way they work within the business to suit the software. While user-centric design might be a huge buzzword in management circles, for those poor users of enterprise software, it seems to be a foreign concept.+ Also on Network World: Where do mobile apps fit in the world of enterprise software? +To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 10:00 am

33% off ThermoPro TP07 Remote Wireless Digital Cooking Thermometer - Deal Alert

The TP-07 Digital Wireless Thermometer is a perfect choice to accurately monitor your meat remotely. Stop going back and forth from indoors to outdoors to check up on your meat, and instead monitor it from 300 feet away! Does your recipe call for your meat to be at a specific temperature? Not to worry, this unit allows you to set your desired temperature, so you're enjoying the meat the way you prefer. If you're new to cooking or unsure of meat temperatures, don't worry our system includes programmed USDA approved temperatures for all kinds of meats at different doneness levels.  This device averages 4.5 out of 5 stars (read reviews). Its typical list price of $45.99 has been reduced by 33% to $30.59.  See the discounted ThermoPro Digital Wireless Thermometer now on Amazon.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 9:14 am

IDG Contributor Network: IoT early warning system helps save people from mudslides

Necessity is the mother of invention.So, it’s no surprise that the best solutions are designed close to where they’re most needed. How do you empower people in remote parts of the world to develop their own solutions? How can their best solution be shared globally with others to maximize the benefit?Responding to disasters in El Salvador Floods and mudslides regularly devastate El Salvador. Villagers can identify impending floods and mudslides, but they are unable to warn others in time. Rugged terrain, lack of power and cellular networks present a formidable communication challenge. Reacción, a team of El Salvadorian experts in electronics, community development and disaster relief, decided to do something about it. Working with local villagers and global experts, they developed an IoT-based early warning system for disasters that’s now shared globally.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 7:00 am

19% of shoppers would abandon a retailer that’s been hacked

Nearly a fifth of shoppers would avoid at a retailer that has been a victim of a cybersecurity hack, according to a survey.The 2016 KPMG Consumer Loss Barometer report surveyed 448 consumers in the U.S. and found that 19% would abandon a retailer entirely over a hack. Another 33% said that fears their personal information would be exposed would keep them from shopping at the breached retailer for more than three months.The study also looked at 100 cybersecurity executives and found that 55% said they haven't spent money on cybersecurity in the past yearand 42% said their company didn't have a leader in charge of information security.To read this article in full or to leave a comment, please click here

Posted on: 24 August 2016 | 6:34 am