İlker

124 Flips | 17 Magazines | 18 Following | 3 Followers | @ilkeri | Keep up with İlker on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “İlker”

Advanced computing with IPython

June 4, 2018<p>This article was contributed by Lee Phillips<p>If you use Python, there's a good chance you have heard of IPython, which provides an …

The MATADOR Intermittent Diet

A Science-Approved Plan for Sustainable Fat Loss<p>Here's what you need to know...<p>The majority of diets don't work for long. Hunger pangs plague you, …

10 essential career lessons to embrace before it’s too late

Keep your head down and your nose to the grindstone—or so we’ve been taught.<p>Is that really the best career guidance?<p>People often take this sort of …

What You Need to Know About Growing Your Email List in a Post-GDPR World

What if you woke up one day to a world that no longer made sense? A world where something that you’ve held as rock-solid truth suddenly…isn’t?That’s …

How Why the Cybersecurity Landscape Is Changing

A comprehensive new report from Cisco should "scare the pants off" enterprise security leaders.<p>Cisco recently published its 2018 annual cybersecurity …

How To: Hack Open Hotel, Airplane & Coffee Shop Wi-Fi with MAC Address Spoofing

After finding and monitoring nearby wireless access points and devices connected to them, hackers can use this information to bypass some types of …

To Control Your Life, Control What You Pay Attention To

One of the best insights on what true productivity means in the 21st century dates back to 1890. In his book <i>The Principles of Psychology, Vol.1</i>, William James wrote a simple statement that’s packed with meaning: “My experience is what I agree to attend to.”<p>Your attention determines the experiences …

Russian Hackers Attacking U.S. Power Grid and Aviation, FBI Warns

Russian hackers are conducting a broad assault on the U.S. electric grid, water processing plants, air transportation facilities and other targets in …

What CISOs Should Know About Quantum Computing

Enterprise Vulnerabilities <br>From DHS/US-CERT's National Vulnerability Database<p>An issue was discovered in Rincewind 0.1. A reinstall vulnerability …

5 things I'm glad I learned from Stephen Hawking

Famed cosmologist Stephen Hawking, who passed away early Wednesday at the age of 76, was a unique public figure, one who straddled the line between …

Stephen Hawking

Stephen Hawking's Black Hole Theory Explained For Non-Physicists

'If you feel like you're in a black hole, don't give up, there is a way out'.<p>Professor Stephen Hawking had a rather ambitious aim in life - to …

10 Breakthrough Technologies 2018 - MIT Technology Review

Every year since 2001 we’ve picked what we call the 10 Breakthrough Technologies. People often ask, what exactly do you mean by “breakthrough”? It’s …

How to buy a camera in 2018

We've entered a golden age of video and photography.<p>Smartphones have replaced dedicated cameras for most folks, but weirdly, that's a good thing for photography lovers. With fewer boring point-and-shoots, manufacturers are focusing on building incredible cameras like Sony's RX100 Mark V compact, …

Quantum memory storage is more efficient and secure than ever

Quantum Memory<p>In a major first for the advancement of quantum memory, researchers at Laboratoire Kastler Brossel (LKB) in Paris have achieved …

The Era of Quantum Computing Is Here. Outlook: Cloudy

After decades of heavy slog with no promise of success, quantum computing is suddenly buzzing with almost feverish excitement and activity. Nearly …

6 Emerging Categories for Blockchain Use Cases

Disclaimer: This is not investment advice.<p><b>May 12, 2015.</b> That was the day I purchased my first bitcoin after a few months of researching and …

Why Triton malware will 'change the game' of cyberwarfare

Mayer Brown partner and attorney Marcus Christian explains the exploit in Triconex systems, how hardware hacks work, and the legal ramifications of …

40 seconds cycling, three times per week: That’s how much you need to ride to get fit, says BBC documentary

<b>Volunteers in BBC documentary see upp to 14 per cent improvement in fitness over five weeks</b><p>Two minutes of riding per week isn’t a lot, but apparently …

UK Government warns energy, health and water brands to prepare for cyber attacks or face fines

The UK government has warned firms providing "critical" services that they could risk fines of up to £17m if they do not have effective cyber …

Cybersecurity

Telegram Launches the Biggest ICO Ever

<b>Telegram, an encrypted messaging app is launching an ICO that is expected to be one of the biggest ever. The company’s founder Pavel Durov wants to</b> …

Hacking Tools List for Hackers & Security Professionals

Penetration testing & Hacking Tools Tools are more often used by security industries to test the vulnerabilities in network and applications. Here …

The 10 Statistical Techniques Data Scientists Need to Master

This was a basic run-down of some basic statistical techniques that can help a data science program manager and or executive have a better …

New security service from Cloudflare hopes to kill the VPN once and for all

Remote workers or business travelers have long been familiar with the travails of working through virtual-private network software, but Cloudflare …

EU privacy boom’s a business bust

In Stockholm, you can store your data in a refurbished nuclear bunker behind a 40-centimeter-thick steel door. In Berlin you can buy a spy-proof …

When Scriptlets Attack: The Moniker

Posted by and ON JAN 11, 2018<p><i>Authored by:</i> <i>Alexander Sevtsov</i> <i><br>Edited by: Stefano Ortolani</i><p>In the previous article, we have described an attack that makes …

Cyberattacks could lead to use of nuclear weapons

The world's nuclear weapons may be more vulnerable to cyber attacks than previously thought and could result in an accidental missile launch …

Beagle – Find vulnerabilities in your websites easily

I came across a new scanner named Beagle. This scanner really crawls fast compared to the other scanners I have experienced. It’s faster in detecting …

Cyberattack could lead to inadvertent nuclear strike, think tank warns

World<p>Nuclear strikes could be launched by mistake because aging or unsophisticated weapons systems are vulnerable to cyberattacks, an international relations think tank warned Thursday.<p>A hack could lead to false information being passed to decision makers during a crisis, the think tank, Chatham …

North Korea

Apple Health app data used as evidence in rape investigation

The activity info lined up with the suspect's behavior.<p>Law enforcement might have difficulty accessing iPhones, but it can obtain a wealth of information when it does get in. German investigators have used data from iOS' built-in Health app as evidence in the investigation of a rape and murder …

GeoTagging

After More Than a Decade, Wi-Fi Security Finally Gets a Major Update

WPA3 promises better authentication, stronger encryption and protection for open networks.<p>Wi-Fi Protected Access II, commonly known as WPA2, has been the standard for securing wireless networks for over a decade, but cracks are starting to show. The industry is now getting ready for its successor …