Putting a computer in your brain is no longer science fiction

•August 19, 2016 • Comments Off on Putting a computer in your brain is no longer science fiction

http://ift.tt/2b7vcHo

Present Tense

•August 15, 2016 • Comments Off on Present Tense

It makes much more sense…
https://g.co/kgs/dNvCb4

Google’s mysterious new Fuchsia operating system could run on almost anything

•August 15, 2016 • Comments Off on Google’s mysterious new Fuchsia operating system could run on almost anything

http://ift.tt/2aUiLOR

The Windows 10 Anniversary update is here. Best feature? Linux Bash shell with native access to the Windows file system! SSH without Putty?!?

•August 11, 2016 • Comments Off on The Windows 10 Anniversary update is here. Best feature? Linux Bash shell with native access to the Windows file system! SSH without Putty?!?

from Facebook
via IFTTT

Hackers Make the First-Ever Ransomware for Smart Thermostats

•August 8, 2016 • Comments Off on Hackers Make the First-Ever Ransomware for Smart Thermostats

http://ift.tt/2aYq0td

Carnegie Mellon’s Mayhem AI takes home $2 million from DARPA’s Cyber Grand Challenge

•August 5, 2016 • Comments Off on Carnegie Mellon’s Mayhem AI takes home $2 million from DARPA’s Cyber Grand Challenge

“The idea is, of course, to produce systems that can patch themselves, watch for intrusions, and so on, with minimal human interaction. It’d be nice to know that your computer is looking out for itself.”
http://ift.tt/2aAc9VM

“Come play with us Danny…forever…and ever…and ever…”

•August 3, 2016 • Comments Off on “Come play with us Danny…forever…and ever…and ever…”
via Facebook http://ift.tt/2b3V8Fi

“Come play with us Danny…forever…and ever…and ever…”

•August 3, 2016 • Comments Off on “Come play with us Danny…forever…and ever…and ever…”

from Facebook
via IFTTT

www.symantec.com

•July 24, 2016 • Comments Off on www.symantec.com

“Backing up important data is the single most effective way of combating ransomware infection. Attackers have leverage over their victims by encrypting valuable files and leaving them inaccessible. If the victim has backup copies, they can restore their files once the infection has been cleaned up.”
http://ift.tt/2a56NFS

The Value of a Hacked Company — Krebs on Security

•July 20, 2016 • Comments Off on The Value of a Hacked Company — Krebs on Security

“The sad truth is that far too many organizations spend only what they have to on security, which is often to meet some kind of compliance obligation such as HIPAA to protect healthcare records, or PCI certification to be able to handle credit card data, for example. However, real and effective security is about going beyond compliance — by focusing on rapidly detecting and responding to intrusions, and constantly doing that gap analysis to identify and shore up your organization’s weak spots before the bad guys can exploit them.”
http://ift.tt/2a0LMNM