Pol.Lt.Col.Nunthawut Rodmanee

195 Flips | 3 Magazines | 26 Likes | 12 Following | 1 Follower | @policeth | Keep up with Pol.Lt.Col.Nunthawut Rodmanee on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Pol.Lt.Col.Nunthawut Rodmanee”

The 5 cyber attacks you're most likely to face

As a consultant, one of the biggest security problems I see is perception: The threats companies think they face are often vastly different than the …

Cyber-attacks

7 Body-Language Hacks to Try When Meeting New People

Do you know what a "power pose" is? Time to learn.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>For some of us, meeting new people is a scary, intimidating necessity. For others, it’s an exciting and enlightening adventure. Either way, you’re going to meet new people in your life, …

Self-help

Cybersecurity headhunter shares 10 secrets from Black Hat 2017

Recruiting cybersecurity talent has never been more difficult. Cybersecurity Ventures predicts there will be 3.5 million unfilled cybersecurity jobs …

Black Hat

These 9 behaviors could cut your dementia risk by 35 percent

Quitting smoking, being social, and exercising more can boost your brain health.<p>Dementia has long been thought of as an inevitable part of aging, but researchers are increasingly learning that’s not quite true.<p>About a third of dementia cases might actually be avoided by living a lifestyle that …

The Brain

Your guide to retail social media marketing

Marketing your retail store has become more complex and more layered than ever before. To drive traffic to your brick-and-mortar store or online, you …

Russian hackers hit Ireland's power grid in another cyberattack on UK's critical infrastructure

Although there is no evidence to suggest that Irish energy networks were disrupted, security experts reportedly believe hackers have stolen …

These Free Marketing Tools Will Help Grow Your Home Business

Technology has made starting and growing a home business easier and more affordable than ever. One of the biggest impacts is the plethora of free and …

Facebook users pwnd by phone with account recovery vulnerability

Another lonely day, with no one but FB, oh... I'll send an SMS to the worldFacebook account recovery using pre-registered mobile numbers is poorly …

Online Life

Top 10 phishing email subject lines that launch ransomware

Ransomware is coming at you—via email messages to your employees. Ninety-one percent of attacks by cyber criminals start through phishing, according …

Top 10

Apple iOS Malware Growth Outpaces that of Android

Number of iOS devices running malicious apps more than tripled in three consecutive quarters, while infected Android devices remained largely flat, …

119 Facts About Email Marketing [Infographic]

You may know these mobile marketing stats, but you don't know these email facts... Or do you?<p>An infographic by WebsiteBuilder.org is full of facts …

8 steps to better social media marketing

It’s one thing to be <i>on</i> social media; it’s quite another to be good at it.<p>Here to help in this confusing cyber quest are the people of Digital …

Hack Brief: 'Devil's Ivy' Vulnerability Could Afflict Millions of IoT Devices

The security woes of the internet of things stem from more than just connecting a bunch of cheap gadgets to a cruel and hacker-infested internet. …

Two-factor authentication is a mess

It was supposed to be a one-stop security fix. What happened?<p>For years, two-factor authentication has been the most important advice in personal cybersecurity — one that consumer tech companies were surprisingly slow to recognize. The movement seemed to coalesce in 2012, after journalist Mat Honan …

Amazon's time to shine; Tesla's big reveal; Sunny stocks

<b>1.</b> <b>Prime time:</b> Amazon's third annual Prime Day kicks off at 9 p.m. ET on Monday and runs for 30 hours.<p>Amazon (AMZN) is again promising big deals to its Prime members around the world and says new deals will be offered every five minutes.<p>Amazon says customers who do not already have Prime memberships …

Your anti-virus software is not enough

As cyber-security gets more complicated, you should be taking more steps to protect yourself.<p>There was a time when anti-virus software was the height of computer security, especially if you were a Windows user. But the landscape of threats has changed, and we live in an era of sweeping, global …

Anti-Virus Software

These Founders Turned An MIT Class Project Into A Leading Analytics Company

<b></b>A recent survey revealed that 89% of consumers prefer conversing with virtual assistants to answer questions and find information online.<p>Of this segment, 73% desire a personalized conversation; with 64% preferring the chat bots recommend products or services that match their interests.<p>Despite these …

Big Data

Data Shows the 3 Things You Need for a Successful Facebook Ad

Following these steps can help businesses get more bang for their buck.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>Facebook has become an advertiser’s not-so-secret weapon. Whether you're organizing a craft beer festival for 21-to-34-year-old Deadmau5 fans in Boulder, Colo., or …

Social Media

How to Build SEO Backlinks: A Beginner's Guide

What Google wants to see is authoritative and relatable links talking about your site.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>Many entrepreneurs, business owners and marketers can relate to the difficulty of growing a business. Not only do you have to execute on the day-to-day …

Google News

Report details how scammers are abusing App Store & Search Ads

Prior to WWDC last week, Apple highlighted that it has now paid developers over $70 billion through the App Store, with $21 billion of that occurring the last year. A new post on Medium from Johnny Lin, however, highlights that not all of that $70 billion is necessarily legitimate…<p>The post outlines …

Apps

So now hackers can use your phone's sensors to steal your PIN number

Yeah, so this isn't good.<p>What if the very act of tapping your smartphone's passcode was all it took to expose that code to hackers?<p>Are you sitting …

Google DeepMind open sources Sonnet so you can build neural networks in TensorFlow even quicker

Google’s DeepMind announced today that it was open sourcing Sonnet, its object-oriented neural network library. Sonnet doesn’t replace TensorFlow, it’s simply a higher-level library that meshes well with DeepMind’s internal best-practices for research.<p>Specifically, DeepMind says in its blog post …

Deep Learning

The next cyberattack could render your anti-virus and encryption software useless

But your devices are increasingly at risk from "side-channel" attacks, where an intruder can bypass traditional network entry points and use another way to compromise the device.<p>These side channels can involve measuring several of the device's characteristics, including its power consumption, the …

Cybersecurity

Facebook Is Partnering With Amazon.com to Take on Google

Facebook is opening up header bidding to all publishers using its ad network.<p><b>Facebook</b> (NASDAQ:FB) is already a dominant force in digital display …

Display Advertising

This Bitcoin Botnet is Vying to Be Future of Secure IoT

Strong claims need strong proof, so when the founders of NeuroMesh described their bitcoin-based product as an "unhackable botnet", there were a lot …

White Hat

Almost 1,000 Online Stores Under Attack from GiftGhostBot Botnet

A botnet specialized in gift card fraud is using the infrastructure of nearly 1,000 websites to check the balance of several types of electronic gift …

New Attack "XSSJacking" Combines Clickjacking, Pastejacking, and Self-XSS

Security researcher Dylan Ayrey detailed last week a new web-based attack named XSSJacking that combines three other techniques — Clickjacking, …

Feature or flaw? How to hijack a Windows account in less than a minute

By the researcher's own admission, he's not sure if it's a newly-discovered security flaw — or a feature.<p>A security researcher has published a way to …

Internet Of Things Will Revolutionize Retail

• 70% of retail decision makers globally are ready to adopt the Internet of Things to improve customer experiences.<br>• 73% of retailers rate managing big data as important or business-critical to their operations.<br>• 78% of retailers say it is important or business-critical to integrate e-commerce and …

eCommerce

Google’s Uptime app offers unique way of watching YouTube videos with friends

Google opened the Area 120 startup combinator last year, which allows its employees to work on their own business ideas. Now, the first product developed at the incubator, called Uptime, has been officially announced. Uptime is a group video messaging app that lets you watch YouTube videos with …