Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,827 Topics
- 12,318 Replies
[b]The breach exposed 20,000 emergency room patients' medical information.[/b] The [url=http://www.mercurynews.com/my-town/ci_25398083/4-1m-settlement-possible-stanford-medical-information-breach]San Jose Mercury News[/url] reports that Stanford Hospital & Clinics and former contractor Multi-Specialty Collection Services (MSCS) will likely pay $4.1 million to settle a class action lawsuit over a 2010 data breach that exposed approximately 20,000 emergency room patients' medical information. [url=http://www.esecurityplanet.com/network-security/stanford-hospital-contractor-to-pay-4.1-million-for-2010-data-breach.html]Full Article[/url]
"Quote" Safari, Chrome push to mask URLs By [url=http://www.computerworld.com/s/author/9000163/Gregg+Keizer]Gregg Keizer[/url]June 6, 2014 06:45 AM ET Summary/ Computerworld - Safari on OS X Yosemite will mask most of a URL in its top-of-window address bar, following in the footsteps of Safari on iOS, and beating Google's Chrome, which is experimenting with the same design, to the desktop. ComputerWorld/ Full Read Here/ [url=http://www.computerworld.com/s/article/9248884/Safari_Chrome_push_to_mask_URLs]http://www.computerworld.com/s/article/9248884/Safari_Chrome_push_to_mask_URLs[/url]
That's what Rich Lee decided to do. Inspired by an Instructables tutorial on how to [url=http://www.instructables.com/id/Make-Your-Invisible-Earphones/]make invisible headphones[/url] using magnets and a coil necklace with an attached amplifier, the 34-year-old entrepreneur went a step further and implanted one such headphone in each ear. Full Read Here:[url=http://news.cnet.com/8301-17938_105-57591584-1/surgically-implanted-headphones-are-literally-in-ear/]http://news.cnet.com/8301-17938_105-57591584-1/surgically-implanted-headphones-are-literally-in-ear/[/url] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/4744i5D71A46999F07190.jpg[/img][img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/4746i1C78DF9DB4EBF5DA.jpg[/img]
By [url=http://www.securityweek.com/authors/eduard-kovacs]Eduard Kovacs[/url] on May 27, 2014[b]VirusTotal, the popular service that lets users analyze suspicious files and URLs to help facilitate the detection of malware, has launched a Mac OS X version of its VirusTotal Uploader utility. [/b] In September 2012, Google [url=http://www.securityweek.com/google-acquires-virustotal]acquired VirusTotal[/url], which lets users submit a file that may be suspect and scans it using the engines of dozens of antivirus products to see if the file in question has been marked as malicious by any of the vendors. [img]http://www.securityweek.com/sites/default/files/Virus-Total.png[/img] The VirusTotal Uploader tool enables security researchers to easily submit files to VirusTotal. The Windows version of the utility has been around for years and it has benefited from numerous improvements. Some members of the community have even developed alternatives, l
By [url=http://www.infoworld.com/author-bios/serdar-yegulalp]Serdar Yegulalp[/url] | [url=http://www.infoworld.com/]InfoWorld[/url] Posted on June 30, 2014 Self-upgrading, subscription-based Linux distribution built around Docker containerization draws funding from backers for Puppet Labs CoreOS, a newly minted Linux distribution that [url=http://www.infoworld.com/t/application-virtualization/coreos-uses-docker-put-linux-diet-242218]uses Docker containers[/url] to manage both applications and the system as a whole, has landed $8 million in Series A funding and announced a subscription version of its product -- two moves that nudge it closer to Red Hat territory. [url=https://coreos.com/products/managed-linux/]CoreOS Managed Linux[/url], as the new subscription product is called, runs on one's own servers or on supported platforms (Amazon, Google, and Rackspace, among others) and is automatically kept current by CoreOS's engineers. Patches and updates are streamed to each
Today, Chaochao Lu and Xiaoou Tang at the Chinese University of Hong Kong say they’ve done just that. These guys have developed a face recognition algorithm called [i]GaussianFace [/i]that outperforms humans for the first time. Full article [url=https://medium.com/the-physics-arxiv-blog/2c567adbf7fc]here[/url]. While this is an exciting technical achievement, it's yet another tool in the surveillance arsenal that could be ripe for abuse.
[i]“Antivirus is dead!” [/i]has been the marketing cry of vendors wishing to displace antivirus (AV) technology with their “superior” comprehensive products. It’s true, purely signature-based AV scanners are extinct; however, AV is constantly evolving. The future can be predicted through knowledge of the past. This first brief in a two-part series on AV studies its evolution from the Brain virus to the Flame worm, from single threat remediation to modern day suites of technologies that contain industry-developed technology and protection mechanisms adopted from other security sectors. [url=https://www.nsslabs.com/system/files/public-report/files/From%20Brain%20to%20Flame%20-%20Myths%2C%20Facts%2C%20and%20the%20Future.pdf]Full Article[/url] "It’s true, purely signature-based AV scanners are extinct" The future behind the Webroot technologies!
Author/ Zeljka Zorz/ HNS Managing Editor Posted on 23 June 2014. A team of Cisco software engineers has created a new encryption scheme, and has released it to the public along with the caveat that this new block cypher is not ready for production, i.e. is still in the experimental phase. It's been dubbed FNR (shortened for "Flexible Naor and Reingold"), and is a "practical variant" of the work proposed in an [url=http://link.springer.com/article/10.1007%2FPL00003817]earlier work[/url] by researchers Moni Naor and Omer Reingold. Help Net Security/ full read here/ [url=http://www.net-security.org/secworld.php?id=17035]http://www.net-security.org/secworld.php?id=17035[/url]
If you think you receive a lot of unwanted email each day, spare a thought for Hotmail user David S. Peck of Fresno, California. He’s the owner of an email account that received thousands of unwanted messages, as Gmail went down for a few hours last week. As Sarah Perez from [url=http://techcrunch.com/2014/01/24/gmail-glitch-is-causing-thousands-of-emails-to-be-sent-to-one-mans-hotmail-account/]TechCrunch reported[/url], a bizarre glitch in Google’s search results meant that users hunting for Gmail could find themselves sending an email to Peck’s Hotmail address instead. Clicking on the “Email” link in the Google search results for “Gmail” took Gmail users directly to a compose message form, pre-filled with Peck’s Hotmail address. In time, Google confirmed that the bizarre bug was not related to the [url=http://mashable.com/2014/01/24/gmail-down-012414/]downtime[/url] which affected Gmail and Google Plus on Friday, but the timing seems unfortunate. Especially for David S Peck, who
As a gamer myself, I have to say, I am pretty psyched up about [url=http://www.ign.com/articles/2013/01/09/ces-microsoft-illumiroom-makes-your-room-a-screen]this[/url]. Check out the video. [i]Microsoft explains that IllumiRoom “augments the area surrounding a television screen with projected visualizations to enhance the traditional living room entertainment experience” and “can change the appearance of the room, induce apparent motion, extend the field of view, and enable entirely new game experiences." Kinect captures the geometry of a room and adapts projected visuals “in real-time without any need to custom pre-process the graphics.”[/i] Being a PS3 fan myself, I hope Sony will catch up quickly. This may be what gets me to buy a 360 finally. At some point, people will just use a whole room and replace the TV altogether with a projector don't you think?
By [url=http://www.theregister.co.uk/Author/2835]Tom Brewster[/url], 23 Jun 2014 No doubt many of The Reg’s readers are tired of the term “the Internet of Things”. It is both a nebulous term and a vague idea. What it attempts to encapsulate is the masses of networks of automated machines that didn’t traditionally have connectivity, working to manage the environment around them, supposedly for the benefit of everyone. Typical examples are fridges that notify users when something’s not right with the groceries inside, smart energy systems that manage heating to maximise efficiency and a toothbrush that reports oral hygiene habits to dentists. It’s a brave new world, one rife with possibility for businesses hoping to make money from things that weren’t profitable before they were able to interact with the internet. The problem with giving objects IP addresses, however, is that they become exploitable. And in the world of embedded devices, if hackers hit them, they might be a
The Khronos Group, arbiters of the OpenGL 3D specification and a range of related specifications, has announced version 3.1 of OpenGL ES, its 3D API oriented toward mobile systems. The headline feature of the new spec is support for compute shaders. OpenGL and OpenGL ES are built around a graphics pipeline that feeds in geometry (lines and points) and textures at one end while producing pixels at the other. Compute shaders break out of that graphics orientation by providing a model for GPU-based computation that's not tied to any specific part of that pipeline. Compute shaders can still be used graphically—manipulating or producing geometry, for example—but they can also be used for non-graphical things, such as physics computations. ES 3.1 also adds support for indirect drawing, which enables the GPU to draw objects taken from a buffer in GPU memory rather than CPU memory. This is important especially in conjunction with compute shaders, as those shaders can be used to create objects
Though the [url=http://reviews.cnet.com/htc-one/]HTC One[/url] is a stellar phone just as it is, I know that many Android purists would prefer that it shipped with Google’s stock OS while forsaking all of the fancy tricks and glitzy software that HTC layered upon it. Fortunately, with the new $599 HTC One Google Play Edition, that day is here. Using the same hardware and design as the 32GB GSM HTC One model, this unlocked handset runs pure, sweet Android 4.2.2 Jelly Bean, the freshest version available. Even better, Google has pledged that the HTC One Google Play Edition qualifies as a true Nexus device, so it will be first in line for future updates. It all sounds like a dream come true, but there are trade-offs for pushing HTC Sense aside. For example you can kiss goodbye all of the standard HTC One’s slick camera features, such as Zoe Share, TV remote control, and BlinkFeed. If that’s a price you’re willing to pay for Android purity, though, besides a lot of cash up front, then this
[b]Google's standalone Docs and Sheets mobile apps work offline[/b] by Katie Collins Google has introduced standalone mobile apps for its cloud-based document and spreadsheet tools, in order to simplify the process of creating and editing content on the move. Docs and Sheets will be available on both Android and iOS and are designed to give users easier access to files so that you no longer have to root through Drive to find them. Both of the apps are available now, although there is also a Slides app on the way, which will allow users to create and edit presentations at the touch of a button. When you open the apps, you will see all of your most recently-edited files, which should make it easier to find what you're after, with less scrolling and searching required. Perhaps most importantly, the apps will come with offline support built in so that you can view, edit and create documents without needing an internet connection. The next time you use the Drive app on your
By [url=http://www.esecurityplanet.com/author/20512210/Joe-Stanganelli]Joe Stanganelli[/url] | Posted July 01, 2014 Healthcare and life sciences organizations are some of the biggest users of Big Data today. The industry is already beginning to enter the exabyte age. Chris Gladwin, CEO of storage solutions company Cleversafe, announced in April that Cleversafe had acquired exabyte customers. The industry will likely begin using up [url=http://www.saasintheenterprise.com/author.asp?section_id=3438&doc_id=273367&]zettabytes in less than 10 years[/url]. With this growth in data, two things have become extremely important to health and life sciences organizations: collaboration (including externalization) and the cloud. The two go hand in hand. "If you're going to the cloud, are others going with you?" asked Sebastien Lefebvre, IT platform director of Research and Development for Biogen Idec, during at a presentation at the recent Bio-IT World Conferen
[b]The BUILD 2014 developer conference will open its doors later today, so Microsoft is getting ready for several important announcements, including the unveiling of the new Windows 8.1 Update pack of improvements.[/b] As we’ve already told you, [b]Microsoft is going to live stream the event[/b], so if you can’t attend the show in San Francisco, you can watch it online using [b][url=http://www.buildwindows.com/]this link[/url][/b]. We’re also going to embed the live streaming into this article later today when it becomes available. This year’s BUILD show is particularly important for Microsoft not only because the software giant is planning to introduce the new Windows 8.1 Update, but also because the company is set to share [b]more details on Windows 9[/b], the next big project coming out of the Redmond campus. Windows 9, which according to sources familiar with the matter is expected to arrive on the market in early 2015, will bring quite a lot of major changes to t
[b]Apple's SSL encryption fail and iOS keylogging flaw juiced anxiety levels in an industry already reeling from security fatigue[/b] It's hard not to be paranoid about technology these days, what with the constant onslaught of [url=http://www.infoworld.com/d/security/target-says-40-million-cards-likely-skimmed-in-security-breach-232946]data theft[/url], [url=http://www.infoworld.com/t/web-browsers/internet-explorer-snowman-zero-day-spreading-use-alternative-or-patch-kb-2934088-237200]zero-day exploits[/url], malware [url=http://www.infoworld.com/d/security/zeus-malware-botnet-variant-spotted-crawling-salesforcecom-236638http://]botnets[/url], and run-of-the-mill [url=http://www.infoworld.com/d/security/google-expands-bug-bounty-program-ups-patch-program-rewards-235749]security vulnerabilities[/url]. Add into that mix the ongoing revelations about [url=http://www.infoworld.com/t/encryption/how-the-nsa-was-able-snoop-our-email-233508]NSA snooping[/url] and the [url=http://www.in
By [url=http://www.infoworld.com/author-bios/david-linthicum]David Linthicum[/url] | [url=http://www.infoworld.com/]InfoWorld[/url] Posted on June 27 2014 Neither the buzzword nor the [url=http://www.infoworld.com/d/consumerization-of-it/what-the-internet-of-things-really-means-217657]concept of the "Internet of things"[/url] is new. Since the Internet emerged back in the 1990s (and before), we found it interesting to connect Coke machines and coffee pots, among other items. In fact, some of my first work with the Internet was around connecting data-collection devices to remote databases. These days, everything comes with some kind of network connection option. This includes our thermostats, TVs, refrigerators, and [url=http://www.cnet.com/news/internet-connected-coffee-maker-has-security-holes/]even coffee makers[/url]. The real progress is being made in the area of industrial equipment, such as those sold by GE and other manufacturers that have pushed this concept in the last
By [url=http://www.theregister.co.uk/Author/2684]Jasper Hamill[/url], 25 Jun 2014 When Buzzfeed first began to offer the world a constant free stream of inane listicles, cat pics and funny fail.gifs, it seemed too good to be true. Yet it turns out that the world's biggest content aggregator isn't just shiny and happy – it's curious too. In fact, according to a digital marketer, Big Buzzfeed is watching us all. On his [url=http://barker.co.uk/buzzfeediswatching]blog[/url], e-commerce and digital marketing expert Dan Barker warned that Buzzfeed was in fact wolfing down large amounts of its readers' data. The Register/ full read here/ [url=http://www.theregister.co.uk/2014/06/25/buzzfeed_aggregated_data_slurp/]http://www.theregister.co.uk/2014/06/25/buzzfeed_aggregated_data_slurp/[/url]
By Mikael RicknäsJune 11, 2014 04:01 AM ET Summary/IDG News Service - Qualcomm is bringing 4G coverage to offices and homes with a low-cost chip that will power wireless routers with both Wi-Fi and LTE. The introduction of the FSM90xx SoC (system-on-a-chip) is a change of pace for Qualcomm. When the company entered the small cell sector it did so with high-performing products, but has now started to scale down the underlying technology, according to Dan Rabinovitsj, senior vice president at Qualcomm. ComputerWorld/ Full Read Here/ [url=http://www.computerworld.com/s/article/9249014/Qualcomm_chip_combines_Wi_Fi_and_LTE?taxonomyId=15]http://www.computerworld.com/s/article/9249014/Qualcomm_chip_combines_Wi_Fi_and_LTE?taxonomyId=15[/url]
[b]After "a whirlwind trip to Asia" visiting Android partners, Google's SVP Sundar Pichai has just confirmed -- by way of the above photo -- that the next version of his mobile OS is called KitKat aka Android 4.4. The exec shared this geeky nugget on both Google+ and Twitter, while his company has updated the Android developer site with a page chronicling Android's milestones so far. Details are light at the moment, and Google teases its upcoming release with just the following line:[/b] "It's our goal with Android KitKat to make an amazing Android experience available for everybody." [url=http://www.engadget.com/2013/09/03/android-kit-kat/]Full article[/url] and [url=http://www.android.com/intl/en_us/kitkat/]chronicling Android's milestones page[/url].
If three examples of the same thing marks a trend, then we're almost guaranteed to see more systems like the Dell XPS 18. Like the [url=http://reviews.cnet.com/desktops/sony-vaio-tap-20/4505-3118_7-35477655.html]Sony Vaio Tap 20[/url] and the [url=http://reviews.cnet.com/desktops/asus-transformer-aio/4505-3118_7-35567072.html]Asus Transformer AIO[/url], the XPS 18 is a hybrid of the all-in-one desktop and the large-format tablet. In practical terms, that means this is an all-in-one PC with a built-in battery that detaches from its included stand. You can keep it docked, in which case it's virtually indistinguishable from other AIO systems, or pick the 18-inch display up and go from room to room, or farther if you're feeling bold. Why would you want to do that? We've found existing tablets to be very useful for quick information gathering or showing off photos and media, but too small for really sharing efficiently with a group (say, a family). Unlike a large all-in-one desktop screen-s
[img]http://www.neowin.net/images/uploaded/nexusae0_easyunlock1_story.jpg[/img] Chrome OS is expected to get an "Easy Unlock" feature as Google has rolled out an early test version in the developer preview of the portable operating system. The currently non-functional feature, which was spotted by Android Police in one of the latest developer builds of the Chrome OS, will allow users to unlock their devices such as the Chromebook by simply placing their smartphone nearby. As the picture suggests, there is no need for a password so we can expect the feature to use a wireless connection and geo-location data from the paired smartphone to unlock the device in proximity. In its current state, "Easy Unlock" is disabled by default, however, enabling it does nothing more than showing a pop-up notification at startup to use the smartphone for unlocking. While there is no way to setup the functionality at the moment, Android Police believes that a companion Android app may
[b]Spam and online gambling – a surefire loser[/b] by Tatyana Kulikova [i]Daylight robbery or an innocent bet?; Lottery: Win without playing!; Horse racing; Spam doping; Stretching the law[/i] Who hasn’t dreamt of Lady Luck smiling on them and bestowing untold wealth without having to make the slightest effort? Sometimes people get so caught up in the excitement of gambling that they fail to realize they are merely throwing away their money instead of winning that coveted fortune. In their view, gambling is not just a way of winning money but also a chance to try their luck, which is sure to change eventually. Isn’t it? Phenomena in the real world are quick to gain popularity in the virtual world. The various games that involve gambling are no exception: most of them have adapted to the peculiarities of the Internet and successfully established themselves online. However, just like in the real-world gaming industry, popular legal online resources exist
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.