Dan San

1,506 Added | 17 Magazines | 1 Like | 1 Following | 14 Followers | @DanSan2015 | Keep up with Dan San on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Dan San”

GDPR is an opportunity to embrace technology and digitally transform

<b>By Hugh Milward, Director of Corporate, External and Legal Affairs at Microsoft UK</b><p>Businesses affected by the European Union’s General Data Protection …

Innovation

Low-Cost Crimeware Kit Gaining Popularity in Underground Markets

At $150 for a three-month subscription, Rubella Malware Builder presents a threat to enterprises, Flashpoint says.<p>When it comes to malware and …

Information Security

What Developers Need to Know About Europe’s Data Privacy Rules

New GDPR regulations on personal data will affect even individual coders Photo: iStockphoto Photo: iStockphoto <b>On 25 May, enforcement will begin</b> of …

Privacy

Network news, trend analysis, product testing and the industry’s most important blogs, all collected at the most popular network watering hole on the …

Trends

'Unpatchable' Nintendo Switch exploit is perfect example of the importance of firmware security

The exploit, which affects all Nvidia Tegra X1 systems, allows arbitrary code execution at the bootROM level.<p>Building a slide deck, pitch, or …

Information Security

Gmail spam mystery: Why have secure accounts started spamming themselves?

Spam appears in users' sent folders even from accounts that haven't been compromised.<p><i>Video: Robocall from Google? Hang up. It's a scam.</i><p>Some Gmail …

Security

AWS traffic hijack: Users sent to phishing site in two-hour cryptocurrency heist

Criminals pull off a brazen attack using weakness in core internet infrastructure.<p><i>Video: Why Amazon is the world's most innovative tech company --</i> …

Information Security

Hackers built a 'master key' for millions of hotel rooms

New research shows how hackers can manipulate hotel room key cards to gain access to an entire building.<p>Security researchers have built a master key …

Information Security

All-new Gmail

Google's aim with G Suite, its suite of cloud-based collaboration and productivity apps, has always been to "help companies transform the way they …

Apps

The top 12 cryptocurrencies and what they are—and aren’t—good for - MIT Technology Review

Bitcoin (BTC)<p>Launched: 2009 Market value: $163 billion<p>The strengths: The original crypto­currency, Bitcoin is the largest and most popular blockchain …

Cryptocurrency

What is Linux? It’s a free operating system you may already use without knowing

Chances are, if you’re browsing for a new desktop or laptop, it will come packed with the latest version of Windows. Heck, you may even be reading …

Linux

Atlanta projected to spend at least $2.6 million on ransomware recovery

The ransom was never paid, the city confirms. The payment portal was pulled offline by the attacker.<p>Atlanta is setting aside more than $2.6 million …

Ransomware

Disaster recovery and business continuity plan

Natural and man-made disasters can jeopardize the operations and future of any company, so it’s critical to develop a plan to help ensure ongoing …

Disaster Recovery

Chaos Engineering: A cheat sheet

Chaos Engineering is the increasingly popular distributed system testing methodology developed by software engineers at Netflix. Learn more about …

Engineering

17 internet-connected things that really shouldn't be online | ZDNet

1. Don't put your ski lift gondola on the internet<p>This internet-connected ski lift lets anyone start, stop, and reverse the entire unit. You can even …

Cyber-attacks

Mysterious cyber worm targets medical systems, is found on X-ray machines and MRI scanners

Orangeworm hacking group carefully selects victims in highly targeted attacks.<p>A newly-discovered cybercriminal group is installing custom malware …

Cybersecurity

Internet Explorer zero-day alert: Attackers hitting unpatched bug in Microsoft browser

Microsoft is being urged to rush out a patch for a bug in Internet Explorer that's being used in attacks.<p><i>Video: AMD and Microsoft join forces to</i> …

Information Security

The best IoT, smart home gadgets in 2018 | ZDNet

Ring<p>Out of the multitude of IoT devices I have tested, the Ring doorbell remains one of the most useful. Whether you are at home or away, the …

Smart Homes

Coming to your parked car: Amazon Prime in-car deliveries

Amazon will start making deliveries to your parked vehicle via the Amazon Key app. Here's how it works.<p>Amazon will now make deliveries to Prime …

Customers

This cryptocurrency mining malware also disables your security services

A year on from the vulnerabilities being leaked, attackers are still using leaked NSA tools to power new attacks - this time with the newly uncovered …

Security

20 Entangled Qubits Bring the Quantum Computer Closer

Researchers demonstrate the entanglement of 20 qubits that work as a true, albeit small, quantum computer Illustration: Harald Ritsch/IQOQI …

Quantum Computing

How to share files between Linux and Windows

Many people today work on mixed networks, with both Linux and Windows systems playing important roles. Sharing files between the two can be critical …

Linux

Ransomware infects Ukraine energy ministry website

<b>Hackers have used ransomware to take the website of Ukraine's energy ministry offline and encrypt its files.</b><p>The website currently contains a message written in English, demanding a ransom of 0.1 bitcoin - worth $927.86 (£664.98) by today's exchange rate.<p>Ukranian cyber-police spokeswoman Yulia …

Cybersecurity

Hackers find an 'unpatchable' way to breach the Nintendo Switch

Security researchers from ReSwitched have discovered a Nintendo Switch vulnerability that could let hackers run arbitrary code on all current consoles. Dubbed "Fusée Gelée" ("Frozen Rocket") it exploits buggy code in the NVIDIA Tegra X1's USB recovery mode, bypassing software that would normally …

Information Security

Bitcoin more vulnerable to attack than expected

Calculations by University of Twente researchers show that Bitcoin is more vulnerable to attack than people had always assumed. If some Bitcoin users …

Bitcoin

In the 1970s, when Microsoft and Apple were founded, programming was an art only a limited group of dedicated enthusiasts actually knew how to …

Computer Science

Microsoft developers hid a secret puzzle in Windows backgrounds as they knew images would leak

Microsoft developers working on Windows 8 created a puzzle and embedded it in the wallpapers used for internal builds of the operating system. The …

Beta Testing

10 bits of career wisdom for beginning cybersecurity professionals

Cybersecurity can be a demanding and rewarding field. Here are some tips for those just starting out, based on the experience of two seasoned …

Market Trends

How machine learning allowed one company to detect Meltdown and Spectre before Intel went public

In-memory attacks are part of the next generation of exploits that cybersecurity experts need to guard against, and AI and machine learning can …

Machine Learning

Microsoft introduces Azure Sphere for securing IoT devices

Microsoft is introducing new custom silicon, a Linux-based embedded OS and cloud service aimed at securing microcontroller-based devices.<p>Microsoft is …

Microsoft Azure