Posts

Showing posts from October 11, 2018

Astronomy Picture of the Day: The Falcon 9 Nebula

Image
The Falcon 9 Nebula
Not the Hubble Space Telescope's latest view of a distant planetary nebula, this illuminated cloud of gas and dust dazzled even casual U.S. west coast skygazers on October 7. Taken about three miles north of Vandenberg Air Force Base, the image follows plumes and exhaust from the first and second stage of a SpaceX Falcon 9 rocket rising through southern California's early evening skies. In the fading twilight, the reddish smoke drifting in the foreground at the right is from the initial ascent of the rocket. The expanding blue and orange filamentary plumes are from first and second stage separation and the first stage boostback burn, still in sunligh t at extreme altitudes. But the bright spot below center is the second stage itself headed almost directly away from the camera, accelerating to orbital velocity and far downrange. Pulsed thrusters form the upside down V-shape at the top as they guide the reusable Falcon 9 first stage back to the landing si…

Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up

Image
Many organizations have yet to create an effective cybersecurity strategy - and it's costing them millions.

via Dark Reading: https://ift.tt/2CabDyY If New feed item from http://www.darkreading.com/rss/all.xml, then send
Unsubscribe from these notifications or sign in to manage your Email Applets.

Chinese Intelligence Officer Under Arrest for Trade Secret Theft

Image
Yanjun Xu attempted to steal data on advanced aviation technology that GE Aviation, among others, had spent billions developing.

via Dark Reading: https://ift.tt/2CFxFLj If New feed item from http://www.darkreading.com/rss/all.xml, then send
Unsubscribe from these notifications or sign in to manage your Email Applets.

Window Snyder Shares Her Plans for Intel Security

Image
The security leader, known for her role in securing Microsoft, Apple, and Mozilla, discusses her new gig and what she's working on now.

via Dark Reading: https://ift.tt/2ITJ3na If New feed item from http://www.darkreading.com/rss/all.xml, then send
Unsubscribe from these notifications or sign in to manage your Email Applets.

Most Malware Arrives Via Email

Image
Watch out for messages with the word "invoice" in the subject line, too.

via Dark Reading: https://ift.tt/2pPx6pu If New feed item from http://www.darkreading.com/rss/all.xml, then send
Unsubscribe from these notifications or sign in to manage your Email Applets.

Russia's rocket failure could leave the ISS without a crew

Image
Space A lot on the ISS depends on the Soyuz. Here's what Thursday's Soyuz launch failure could mean for operations on the International Space Station. via Popular Science "https://ift.tt/2QN7yFh"

How to set up your home Wi-Fi

Image
Technology Secure your internet So you're ready to stop stealing your neighbor's internet and set-up your home WiFi network. Congratulations! You’ll just need three things to get yourself started. via Popular Science "https://ift.tt/2RJ95NB"

Google Adds New Identity, Security Tools to Cloud Platform

Image
A wave of cloud news includes new tools for identity and access management and policies for stronger controls on cloud resources.

via Dark Reading: https://ift.tt/2OVuqVu If New feed item from http://www.darkreading.com/rss/all.xml, then send
Unsubscribe from these notifications or sign in to manage your Email Applets.

Steam Client Update Released

Image
A new steam client has been released and is being automatically downloaded.

General
Updated embedded Chromium version in Steam to Chromium 68
Added Vietnamese and Latin American Spanish as Steam client UI languages
Allow language selection before game install if current Steam UI language isn’t supported

New Steam Chat
Added ability to test your microphone in Friends Voice settings dialog
Added support for mute on/off toggle hot-key setting when using Open Mic voice transmission mode
Don’t try to start chat or open the friends list if Steam is started in offline mode
Chat tabs are now scrollable using the mouse wheel
Fixed a bug where if you are offline for Friends & Chat clicking Friends & Chat in the overlay would activate the desktop friends window
Fixed a bug causing duplicate sounds for friends coming online or going in-game

Steam Link
You can play local co-op by streaming to multiple devices simultaneously (high quality 5 GHz WiFi network required)
You can use your Android phone as a t…

Not All Multifactor Authentication Is Created Equal

Image
Users should be aware of the strengths and weaknesses of the various MFA methods.

via Dark Reading: https://ift.tt/2ysJIXy If New feed item from http://www.darkreading.com/rss/all.xml, then send
Unsubscribe from these notifications or sign in to manage your Email Applets.

Weekend Deal - Overcooked! 2, 20% Off

Image
Save 20% on Overcooked! 2 as part of this week's Weekend Deal*!

*Offer ends Monday at 10AM Pacific Time
via Steam RSS News Feed "https://ift.tt/2IQdaLZ"

Daily Deal - Day of the Girl

Image
Today's Deal: Save up to 80% on select games and celebrate Day of the Girl!*

October 11th marks International Day of the Girl. Children’s charity War Child UK and its US partner Children in Conflict want to celebrate with a collection of awesome games featuring female protagonists where a portion of the proceeds from participating partners will help support children affected by conflict.

*Offer ends October 18 at 10AM Pacific Time
via Steam RSS News Feed "https://ift.tt/2PuZE38"

One-Third of US Adults Hit with Identity Theft

Image
That's double the global average and more than three times the rate of French and German adults.

via Dark Reading: https://ift.tt/2C9JcRL If New feed item from http://www.darkreading.com/rss/all.xml, then send
Unsubscribe from these notifications or sign in to manage your Email Applets.

Scientists just created healthy mice with same-sex parents

Image
Science And some went on to have healthy babies of their own. A team of researchers used embryonic stem cells and gene editing to produce mice born from two parents of the same sex. Some offspring went on to have healthy babies of… via Popular Science "https://ift.tt/2OhxqMC"

The Better Way: Threat Analysis & IIoT Security

Image
Threat analysis offers a more nuanced and multidimensional approach than go/no-go patching in the Industrial Internet of Things. But first, vendors must agree on how they report and address vulnerabilities.

via Dark Reading: https://ift.tt/2EamjQS If New feed item from http://www.darkreading.com/rss/all.xml, then send
Unsubscribe from these notifications or sign in to manage your Email Applets.

How to track the digital subscriptions silently draining your bank account

Image
DIY Do you know where your money is going? You've signed up for so many digital subscriptions, you can't keep track of them anymore. Here's how to manage the ones you want—and cancel the ones you don't. via Popular Science "https://ift.tt/2A5Buqz"

Deep Dives: New Security Flaws in Apple and Microsoft products at Black Hat Europe

Image
With Black Hat Europe coming to London in a few months, organizers share three of the most promising Briefings slated for the December event.

via Dark Reading: https://ift.tt/2CDTtqw If New feed item from http://www.darkreading.com/rss/all.xml, then send
Unsubscribe from these notifications or sign in to manage your Email Applets.

How Can Businesses Protect against Phishing Attacks on Employee Smartphones?

Image
Smartphones have become synonymous with everyday business operations, enabling employees to store important contact details, browse the web and reply to emails while on the move. However, the ubiquity of such devices has led scammers to increasingly target them with a variety of phishing attacks – all designed to convince individuals to part with sensitive personal and corporate information.With banking details, phone numbers and email addresses all commonly stored on them, a successful attack on an employee's smartphone could have devastating consequences, both for that individual and for your organisation. This threat is even more daunting considering that the click rate for suspicious URLs on mobile has increased 85% year-over-year since 2011.With this in mind, it is vital that business leaders educate themselves on the types of attacks that today's scammers are using, and advise employees on how best to protect themselves.

A new school of phishAlmost everyone has seen a dub…

How Can Businesses Protect against Phishing Attacks on Employee Smartphones?

Image
Smartphones have become synonymous with everyday business operations, enabling employees to store important contact details, browse the web and reply to emails while on the move. However, the ubiquity of such devices has led scammers to increasingly target them with a variety of phishing attacks – all designed to convince individuals to part with sensitive personal and corporate information.With banking details, phone numbers and email addresses all commonly stored on them, a successful attack on an employee’s smartphone could have devastating consequences, both for that individual and for your organisation. This threat is even more daunting considering that the click rate for suspicious URLs on mobile has increased 85% year-over-year since 2011.With this in mind, it is vital that business leaders educate themselves on the types of attacks that today’s scammers are using, and advise employees on how best to protect themselves.

A new school of phishAlmost everyone has seen a dubious ema…

Lessons from Cyber Essentials – Going Back to the Basics

Image
Whether it's phishing attacks or zero-day exploits, businesses are facing an increasing number of cyber threats every day. And when these attacks are successful, businesses can face both reputational and monetary consequences. In fact, a 2018 report from Ponemon found that businesses have to fork out an average of $3.9 million when hit by a data breach. However, there are some simple steps that organisations can follow to achieve cyber resilience and understanding the UK Government's Cyber Essentials scheme is a great start. Launched in 2014, the scheme sets out five simple and effective cyber security measures that businesses of all sizes can implement to reinforce their defences against malicious attacks. Four years on, these measures are just as relevant as ever.Configure and monitor firewalls to secure your internet connectionsAny device that protects the network edge of your organisation, such as a router or firewall, needs to be configured and kept up to date. As key poi…