David

174 Added | 4 Magazines | 9 Likes | 2 Followers | @huntmill | Keep up with David on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “David”

These 3 things are trying to kill Linux containers

For nearly two years, Linux containers have dominated the world of enterprise IT, and for good reason — among others, they take on issues that virtualization simply cannot within application development and computing at scale and allow for the enterprise world to truly embrace concepts like devops …

DevOps

Seven things security experts do to keep safe online

From using password managers to checking urls, best practices revealed in new study<p>Cybersecurity experts aren’t like you or I, and now we have the evidence to prove it. Researchers at Google interviewed more than 200 experts to find out what security practices they actually carry out online, and …

Information Systems

Sniffing GSM traffic with HackRF.

While my friend and colleague Simone was visiting our ZIMPERIUM – Enterprise Mobile Security TLV office, we got our hands on HackRF and hacked …

How misbehaving at school made one man a multimillionaire

<b>There are not many people who have become multimillionaires as a direct result of misbehaving at school, but Jack Cator is one of them.</b><p>Back in 2005, the then 16-year-old was annoyed that his secondary school in Norfolk, eastern England, had put strict blocks on its computer network, to prevent the …

Typing lessons

Take typing speed test, practice your touch typing skills, learn to type faster and with fewer errors with this free online typing tutor.<p>What Is …

Typing

LinkedIn founder Reid Hoffman on the biggest lie employers tell employees

In his new book <i>The Alliance</i><i>,</i> Reid Hoffman argues that the relationship between employers and employees is built on "a dishonest conversation."<p>Hoffman would know. As co-founder and executive chairman of LinkedIn, he sits atop the largest, most data-rich hiring platform the world has ever seen. As a …

Employment

Multipath routing on a Raspberry Pi 2

<b>Skill level:</b> <i>Not for the faint hearted!</i><p>A few years ago, when I started working at home, I had a second ADSL line installed so that I could still get …

PEP 492 -- Coroutines with async and await syntax

This proposal introduces new syntax and semantics to enhance coroutine support in Python.<p>This specification presumes knowledge of the implementation …

Automate the Boring Stuff with Python

Practical programming for total beginners. Written by Al Sweigart.<p>Free to read under a Creative Commons license.<p>Learn to Code<p>If you've ever spent …

How to Detect Sneaky NSA 'Quantum Insert' Attacks

Among all of the NSA hacking operations exposed by whistleblower Edward Snowden over the last two years, one in particular has stood out for its …

Your Smart Home Will Be Hacked. Here’s How to Stop It.

<i>Photo: Thinkstock</i><p>Some day, we will all live in smart homes. Automated gadgets running on the “Internet of Things” will manage our lighting and heat, …

Candy Crush Saga

5G Vs 4G: Will 5G Technology Bring New Dimensions To Wireless?

<b>Building technology that will connect billions of people and things to the internet, and to one another, without wires.</b><p>While much of the world is …

Apple Pay: a new frontier for scammers

Apple’s mobile payment system has provided a method for US criminals to make fraudulent transactions – and banks are rushing to stem the tide<p>Criminals in the US are using the new Apple Pay mobile payment system to buy high-value goods – often from Apple Stores – with stolen identities and credit …

Apple Pay

AT&T to hook up its automated home and connected car services

NEW YORK (Reuters) - AT&T Inc (T.N) will link its connected car and smart home technologies to bolster its foothold in the fast-growing market for Internet-connected devices, a new battleground for the company and rivals ranging from Verizon (VZ.N) to Google Inc (GOOGL.O).<p>An AT&T logo and …

Internet of Things

AT&T combines its connected car and home platforms to help automate your life

BARCELONA, Spain — With the so-called Internet of things now in full swing, U.S. telecom giant AT&T has revealed that it’s tying together its connected car and home automation platforms to create a seamless digital environment.<p>First unveiled more than two years ago, AT&T’s Digital Life is not only …

Intel wants to protect your precious wrist with anti-virus software for smartwatches

This is the saddest day, ever<p>Intel just announced anti-virus software for smartwatches. Yes, that's right, for smartwatches. The chip maker is bundling its McAfee Mobile Security suite with LG's recently announced Watch Urbane LTE. I'm not sure why, and I don't think Intel is either. I asked Intel …

Anti-Virus Software

Phishing scam targets routers that use default security settings

Internet users are being warned to ensure that their routers have unique passwords, after email spammers have been spotted sending phishing links, which try to hijack the devices using default passwords, in order to harvest personal information from their victims.<p>The phishing emails attempt to …

“FREAK” Security Flaw Discovered Lurking In Many Computers For Decades, Apple Promises Fix Next Week

Ugh — another week, another nasty widespread security bug to worry about. The twist this time: this one has apparently been around since the 90s.<p>Dubbed “FREAK” by the researchers who discovered it, the exploit allowed researchers (and potentially hackers) to sniff traffic going to and from many …

Information Security

Ericsson unleashes LTE over the Wi-Fi airwaves

Advertisement<p>3 Comments<p>Credit: Gigaom / Kevin Fitchard<p>Carriers are constantly on the hunt for more 4G spectrum, but the airwaves they need may be …

Telecoms

Sony hacking fallout puts all companies on alert

ATLANTA (AP) — Companies across the globe are on high alert to tighten up network security to avoid being the next company brought to its knees by hackers like those that executed the dramatic cyberattack against Sony Pictures Entertainment.<p>The hack, which a U.S. official has said investigators …

Beware the militarization of cyberspace

In recent months numerous hacking campaigns have been uncovered by security firms. In many cases, they have been attributed to state-sponsored hackers.<p>Groups of hackers belonging to cyber units of several governments used sophisticated malicious code and hacking platforms to compromise computer …

Misfortune Cookie Flaw Puts 12 Million Routers at Risk

A 12-year-old programming error has left millions of home and small office Internet devices wide open to attack.<p>Researchers at the security software company Check Point say they’ve discovered a serious vulnerability lurking inside the routers and modems used to deliver Internet connectivity to 12 …

Half The Size Of JPEG: Could BPG Lead To A Double-Speed Web?

A new graphics file format, proposed by programmer Fabrice Bellard, could cut the file size of digital photos by half with far-reaching consequences.<p><b>How are images made smaller?</b><p>The vast majority of photos taken with a cameras or smartphones and nearly every image viewed on the Web is stored in the …

14 Tech Trends That Will Make Someone Billions Of Dollars Next Year

Which technologies are going to blow up in 2015 and keep growing in 2016, creating billions of dollars for the companies that serve in these areas?<p>To answer that, we scoured the research from leading analyst firms like IDC, Gartner, Forrester, and others.

Digital Marketing

4 Ways To Make Sure Your Cloud Data Isn't Hacked

Between recent high-profile cloud hacks—including the iCloud hacking scandal and the Sony Pictures Entertainment breach—and the fact that 90 percent of U.S. broadband users are now aware of cloud services to store files, cloud security has become an important, deeply-complex and wide-ranging …

SoakSoak malware leaves 11,000 WordPress sites blacklisted by Google

More than 11,000 domains reported to have been blacklisted by search engine, but more than 100,000 sites may be affected<p>More than 11,000 websites using the WordPress blogging platform have been blacklisted by Google, after they were infected by the “SoakSoak” malware.<p>Security firm Sucuri, which …

Gmail gets Content Security Policy support to stop extensions from loading unsafe code

Google today added support for Content Security Policy (CSP) to Gmail. The security feature protects users by stopping extensions from loading unsafe code.<p>CSP is a computer security concept for preventing cross-site scripting (XSS) and related attacks. It provides a standard HTTP header that allows …