Thousands of smart homes and businesses at risk of data breach

Cybercriminals can abuse MQTT servers to gain access to smart homes.

Smart Building Technologies Could Expose Companies To A New Breed Of Cyber Attack

Last month major corporations and household names such as Evernote, TweetDeck and Feedly were held ransom by Internet hackers. Many found this concerning, but even more serious is that some businesses may not realize how highly vulnerable they are to such an attack.

Professor Kevin Fu Answers Your Questions About Medical Device Security

Almost a year ago you had a chance to ask professor Kevin Fu about medical device security. A number of events (including the collapse of his house) conspired to delay the answering of those questions. Professor Fu has finally found respite from calamity,

The Creepy New Security Credit Score for Spotting "Insider Threats"

Almost two years after Edward Snowden climbed the world stage, the intelligence community is just now putting the finishing touches on a computer-driven system for catching insider threats– one that promises not just to detect future Snowdens and Mannings in the act,

Hacker groups going after government domains

Security researchers are suspecting state-sponsored actors.

SMS 2-factor authentication is alive and kicking

Far from dying off, SMS will be confirming online identities across the world for many years to come.

Amazon is shutting its Chinese marketplace

The Chinese will still be able to buy from international sellers.

Four horsemen of the data centre

Budgets, reporting, scale and security are important considerations for a holistic approach

The procurement quandary

Who should take centre stage when it comes to procurement? Why should they?

Facebook uploaded over a million user emails without permission

The emails were used to import contacts and 'improve ads'.

Building reliable data pipelines with AI and DataOps

If we can’t understand or make use of data, then why generate it at all?

How can startups harness the power of IoT

As more and more companies begin to effectively adopt IoT technology, young startups and SMEs cannot risk overlooking the benefits on offer. Doing so will put them a step behind their competitors.

Amazon considers move into UK financial services

US e-commerce giant reportedly in talks with insurance companies to launch its own price comparison site in the UK.

Forging a competitive advantage in the analytics economy

Machine data analytics is predicted to play an increasingly pivotal role in business strategy.




根据The Verge的消息,微软计划在今年10月推出旗下的智能腕表产品。之前曾有传言称苹果iWatch将内置10种传感器,而微软则计划为自己的智能手表加入11种传感器。


研究人员演示了一种针对Tor匿名网络的概念原型攻击Sniper Attack(PDF),利用Tor的端对端可靠数据传输耗光中继服务器的内存,迫使目标中继下线。

Windows XP Falls Below 25% Market Share, Windows 8 Drops Slightly

An anonymous reader writes: Despite support for Windows XP finally ending three months ago, the ancient OS has only now fallen below the 25 percent market share mark. To add to the bad news for Microsoft, after only nine full months of availability, its latest operating system version, Windows 8.1,

c#队列的实现 - lol霖

/* 用一片连续的存储空间来存储队列中的数据元素,这样的队列称为顺序队列 (Sequence Queue)。类似于顺序栈,在这里我就不做介绍了,我们直接用列表实现一个队列 */using System;using System.Collections.Generic;using System.Lin...






进入移动互联网时代之后,金融业务地域限制被打破。金融企业没有固定业务区域,金融服务面对所有用户是平的。 金融消 ...

How technology and social media play a role in 'The Jungle Book'

Disney is going beyond the bare necessities in promoting its live-action film The Jungle Book.The movie, which hits theaters in April 2016, has already generated buzz after the release of a 6-second teaser on Vine,


在野外生存确保通讯设备的正常工作是非常重要的,今天介绍的这款RokPak干燥箱能够为包括智能手机在内的小型数码设备提供电池供应,产品通过了MIL-SPEC 810G跌落测试,IP67防水等级,能够在极端环境(80摄氏度到零下20摄氏度)下正常工作,内部搭载超级坚固的太阳能面板,12000mAh的锂电池、LCD屏幕和LED手电筒,能够在昏暗和夜间提供照明。

© 云聚网互联网资讯 我要投稿 云聚网博客 7秒MCN大数据平台 悠闲吧