Random Post

Monday, August 11, 2014
no image
Current approaches to Java application protection place security at the application or the network layer, both of which are problematic. The first approach has proven to be too complex, too time consuming and too risky -- in other words, "too hot." Meanwhile, network level security that consists of perimeter devices lacks the intelligence to know what's going on inside the application in order to be effective. This approach is "too cold." A third alternative is to place security inside the Java virtual machine.


6:33 AM

Current approaches to Java application protection place security at the application or the network layer, both of which are problematic. T...

Read more »
Friday, August 8, 2014
no image
IBM has announced the latest version of its neurosynaptic processor -- that is, a processor whose workings are inspired by the human brain. Built on Samsung's 28nm process technology, it has 5.4 billion transistors and an on-chip network of 4,096 neurosynaptic cores. IBM claims it is the first neurosynaptic chip to achieve 1 million programmable neurons, 256 million programmable synapses, and 46 billion synaptic operations per second. The size of a postage stamp, the processor consumes just 70mW of power during real-time operations.


3:36 PM

IBM has announced the latest version of its neurosynaptic processor -- that is, a processor whose workings are inspired by the human brain...

Read more »
no image
The Peppermint OS is built around a concept that may be unique among desktop environments. It is a hybrid of traditional Linux desktop applications and cloud-based apps. This innovative approach puts the latest release, Peppermint OS 5, well ahead of the computing curve. It brings cloud apps to the Linux desktop with the ease and flexibility of a Chromebook. It marries that concept to the traditional idea of having installed software that runs without cloud interaction. However, the Peppermint OS is not tethered to Google Apps.


2:55 PM

The Peppermint OS is built around a concept that may be unique among desktop environments. It is a hybrid of traditional Linux desktop app...

Read more »
no image
Wireless carriers pose a threat to mobile phone security, researchers have disclosed. Mathew Solnik and Marc Blanchou of Accuvant this week told an audience at the Black Hat security conference in Las Vegas that Android, BlackBerry and some iOS devices are vulnerable. The problem lies in a device management tool using the OMA Device Management Standard, which carriers embed into mobile devices in order to configure them and push over-the-air firmware updates, among other things.


12:34 PM

Wireless carriers pose a threat to mobile phone security, researchers have disclosed. Mathew Solnik and Marc Blanchou of Accuvant this wee...

Read more »
no image
USIS, the contractor that did the background checks on Washington Navy Yard shooter Aaron Alexis and NSA leaker Edward Snowden, on Thursday reported that its computer systems have been breached. "Our internal IT security team recently identified an apparent external cyberattack on USIS' corporate network," said US Investigation Services, which performs security clearances for the U.S. Department of Homeland Security, in a statement. "We are working closely with federal law enforcement authorities."


7:51 AM

USIS, the contractor that did the background checks on Washington Navy Yard shooter Aaron Alexis and NSA leaker Edward Snowden, on Thursda...

Read more »
Thursday, August 7, 2014
no image

2:56 PM

This week, we met 12 new companies that graduated from DreamIt’s NY Demo Day. We have the scoop on all of them here, from the shoppable Pint...

Read more »
no image
A Russian cybercriminal gang so far has stolen 4.5 billion credentials, of which 1.2 billion appear to be unique, Hold Security has announced. The credentials belong to more than 500 million email addresses. Two reports released Tuesday may help explain why the cybergang was so successful. About 92 percent of the 800 top consumer websites evaluated, and 96 percent of the top 50 United States federal government agencies checked, failed the Online Trust Alliance's 2014 Email Integrity Audit.


2:34 PM

A Russian cybercriminal gang so far has stolen 4.5 billion credentials, of which 1.2 billion appear to be unique, Hold Security has announ...

Read more »
 
Google Analytics Alternative