Matthew Nesman

5,408 Flips | 2 Magazines | 3,260 Likes | 68 Followers | @MatthewNesman | Keep up with Matthew Nesman on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Matthew Nesman”

Apple Watch Series 4 Verdict: The Reviews Are In

Alongside the slick looking new iPhone trio, Tim Cook and the gang also used last week’s big Cupertino event to take the covers off of the newest smartwatch from the company – the Apple Watch Series 4.<p>With a bigger display, extra health tracking smarts and a revamped OS, it promises to be the best …

Apple Watch

The 14 biggest announcements from Amazon’s surprise hardware event

Today Amazon held a hardware event that was loaded with new product announcements. We got new Echo speakers, a new Echo Show, and even a microwave.<p>In many ways, the sprawling event was a showcase of how far Alexa has come in the four years since Amazon’s voice assistant was first introduced in …

Turn the NIST Cybersecurity Framework into Reality: 5 Steps

Actionable advice for tailoring the National Institute of Standards and Technology's security road map to your company's business needs.<p>The first …

Information Security

The Most Fun (and Useful) Things You Can Do With an Amazon Echo or Google Home

If you’re an Amazon Echo or Google Home owner, you may only ask your device for the weather or to play music. That’s O.K., but these devices can do so much more — and they can offer more than a few useful tricks to make you feel as if you’re living in the future.<p>Some of these can make your mornings …

Google Home

Remove yourself from people search sites and erase your online presence

Here is a step-by-step guide to reducing your digital footprint online, whether you want to lock down data or vanish entirely.<p>There is now a very …

Social Media

To Trust Or Not To Trust: That Is The Question

Information security is a field that has received a lot of attention in recent years from theoreticians and practitioners alike. Coming from an IT network security practitioner background over the last 15 years, I am always on the hunt for new ideas, particularly when it comes to innovating in the …

National Security Agency (NSA)

Court Rules FCC Must Release Records That Could Explain Fraudulent Net Neutrality Comments

A federal judge ruled last week that the Republican-controlled Federal Communications Commission (currently chaired by Donald Trump appointee Ajit …

Cybersecurity

Shell and Exxon's secret 1980s climate change warnings | Benjamin Franta

One day in 1961, an American economist named Daniel Ellsberg stumbled across a piece of paper with apocalyptic implications. Ellsberg, who was advising the US government on its secret nuclear war plans, had discovered a document that contained an official estimate of the death toll in a preemptive …

Sea Level

North Korea Agrees to Permanently Dismantle Nuclear Complex If U.S. Takes Corresponding Steps

(PYONGYANG, North Korea) — South Korean President Moon Jae-in and North Korean leader Kim Jong Un announced a sweeping set of agreements after their …

North Korea

Pegasus Spyware Targets iOS, Android Devices in the US

The Pegasus spyware strain, which can infect iOS and Android devices, appears to be targeting victims in the US, says Citizen Lab, a watchdog group …

University of Toronto

Microsoft introduces HoloLens to businesses through Dynamics 365 apps

(Reuters) - Microsoft Corp announced on Tuesday new AI and mixed-reality applications for its Dynamics 365 online business software, putting to use its augmented-reality goggles HoloLens for businesses.<p>The additions to its cloud-based software came two years after HoloLens was launched.<p>The new AI …

Technology

Google's prototype Chinese search engine links searches to phone numbers

Google’s secret prototype search engine for China reportedly links users’ mobile phone numbers to what search terms they’ve used.<p>This feature would allow the Chinese government to simply associate searches with individuals, thereby putting Chinese citizens at increased risk of government repression …

Human Rights

"Lawful intercept" Pegasus spyware found deployed in 45 countries

At least ten operators of Pegasus spyware have deployed the malware outside their country's border, new Citizen Lab report finds.<p>Security researchers …

Human Rights

Weatherman dramatically braces for Hurricane Florence while 2 guys casually stroll by

As Hurricane Florence continues to wreak havoc on the Carolinas, weather people and storm chasers are heading as close as they can to the eye of the …

Apple iOS 12: 14 Awesome Features You Should Know About And How To Use Them

At the iPhone event on September 12th, Apple said that iOS 12 will be released on September 17th. iOS 12 is primarily focused on performance improvements and the fine-tuning of existing features. But there are a few brand new features in iOS 12 that you should know about. Here are some of the best …

iOS

Here's the inspiring 22-year-old bodybuilder who Dwayne 'The Rock' Johnson asked to meet

Nick Santonastasso doesn't know limits.<p>He's an entrepreneur, bodybuilder, model and Internet sensation. The 22-year-old is also an inspirational …

Middle School

How Faking Videos Became Easy and Why That's So Scary

A minute-long video of Barack Obama has been seen more than 4.8 million times since April. It shows the former U.S. president seated, with the …

Jordan Peele

The 6 most secure security systems on earth

Among the hundreds and thousands of codes that have been broken by cryptographers, the government, and even self-taught amateurs tinkering around at …

Fort Knox

EXCLUSIVE: As hackers steal details of 380,000 BA customers, we step inside Britain's cyber security HQ

The recent data breach at British Airways saw hackers steal the financial details of 380,000 customers.<p>It is the latest in a maelstrom of cyber …

Cybersecurity

DHS Warns of Russian Hacking of Utility Networks

The U.S. Department of Homeland Security has begun a series of briefings with executives of utility companies into the successful penetration of …

Cybersecurity

For safety’s sake, we must slow innovation in internet-connected things

That’s the view of security expert Bruce Schneier, who fears lives will be lost in a cyber disaster unless governments act swiftly.<p>Smart gadgets are …

A Russian Who Allegedly Hacked Into JPMorgan Chase's Servers Is Now in U.S. Custody

In 2014, some 76 million JPMorgan Chase customers were less than thrilled to hear that hackers were roaming around company databases containing their …

Financial Services

If You Think The Customer Journey Is Linear Or A Funnel, New Research Suggests You Are Wrong

Customer journey mapping has been a hot topic for some time. Trying to understand how the customer interacts with the brand or company—the touchpoints—can ideally help marketers better understand opportunities to strengthen the customer’s experience. At another level, especially for B2B firms, the …

Entrepreneurship

Scientists get ready to begin Great Pacific Garbage Patch cleanup

A team of scientists and engineers will on Saturday begin an ambitious cleanup of plastics in the Pacific Ocean targeting a stretch of water three times the size of France known as the Great Pacific Garbage Patch.<p>A 600m-long floating barrier will be launched off the coast of San Francisco and, …

Great Pacific garbage patch

US government releases post-mortem report on Equifax hack

GAO report takes us inside Equifax from March 2017 onward, showing how a few slip-ups led to one of the biggest breaches in US history.<p>MUST READ<p>The …

Security

How To Kick Start Your Cyber Security Career

Image: Getty Images<p>The IT sector is in the midst off a massive skills shortage and once of the areas that this is most acutely felt in is …

Cybersecurity

The 'deep web' may be 500 times bigger than the normal web. Its uses go well beyond buying drugs

The so-called dark web, a portion of the hidden internet, is usually associated with a host of illegal activities including the buying and selling of …

Privacy

Best cloud firewall

1. CloudFlare WAF<p>2. Amazon Web Services WAF<p>3. Sophos XG Firewall<p>4. Akamai Kona Site Defender<p>5. Incapsula<p><b>Read on for our detailed analysis of each</b> …

Information Security

Netflix and YouTube are most throttled mobile apps by US carriers, new study says

New research shines a light on how telecoms are throttling mobile video following the death of net neutrality<p>Since the demise of net neutrality, US telecoms have increased the amount of throttling they impose on customers trying to watch mobile video through services like Netflix and YouTube, …

Customers

Seriously, wash your hands before you go through airport security

You may want to pack a TSA-approved travel-sized bottle of hand sanitizer on your next trip through airport security, and then shower in it as soon as you’re through the line.<p>A new study found that those plastic trays where the TSA makes you stash your stuff before it gets X-rayed have more germs …

Flu