-
Jun 30, 2016
Don’t rely on the security of Microsoft Office 365! A variant of Cerber Ransomware are now targeting Office 365 email users with a massive zero-day attack that has the ability to bypass its built-in security tools. Avanan, a cloud security provider,… read more »
-
Jun 30, 2016
What happens to security businesses in UK? http://www.ibtimes.co.uk/ has published a good article about ramification of Brexit on cybersecurity, with some interesting opinions of Brian Spector, CEO of Miracl, a cybersecurity firm based and operating in UK. Lack of tech talents “The… read more »
-
Jun 30, 2016
Know your foot! Runnersworld.com published a simple method to discover if you have a foot with a flat or high arches, useful to choose the right pair of running shoes. The beautiful illustrations are realized by Dan Fuehrer: Pour a thin… read more »
-
Jun 29, 2016
A lot of enterprise and home Symantec users are open to remote code execution vulnerabilities reported by Google’s Project Zero. These vulnerabilities don’t require any user interaction on a software that runs at the highest privilege levels possible: in certain cases… read more »
-
Jun 29, 2016
Marathon Valley, seen through the robotic eyes of Opportunity http://www.jpl.nasa.gov/spaceimages/details.php?id=PIA20749 http://www.jpl.nasa.gov/ has published a very high resolution (17.000x6000 pixels) image of Marathon Valley on Mars surface. The image is a merge of multiple pancam exposures taken during the period April… read more »
-
Jun 28, 2016
A great episode, a great season finale… …a great soundtrack! https://www.youtube.com/watch?v=MFK0yG8xG5I Ramin Djawadi From Wikipedia: Ramin Djawadi (Persian: رامین جوادی; born July 19, 1974) is a German-Iranian composer. Djawadi is best known for his Grammy-nominated, guitar-heavy score for the 2008 Marvel… read more »
-
Jun 28, 2016
How programmers write mission-critical code at NASA? To help them to write code clean, easy to understand and error-proof, NASA’s Jet Propulsion Laboratory has published a document with 10 rules for developing software, named “The Power of Ten–Rules for Developing Safety… read more »
-
Jun 27, 2016
The BGP hijacking is the illegitimate takeover of groups of IP addresses by corrupting Internet routing tables. Autonomous Systems On the Internet any host, identified by its unique IP address, can talk to any other, anywhere in the world: this… read more »