A new report from security research firm, Aspect Security confirms what we have been saying for years: developers simply do not know how to secure their applications. In a recent study where a group of developers were asked questions on security Aspect found that about 80% of them did not know how to protect sensitive data. This is something that we have found in our experience in dealing with vendors and other application developers.
Almost two weeks ago we wrote an editorial about how security issues are more about the corporate culture than just weak passwords. In it we described a problem that exists in far too many companies where executives and/or vendors are the ones that are setting the security policies instead of the IT or IT security teams. This situation can be exceptionally frustrating when you are trying to keep the “bad guys” out, but not everyone really believes that this is how things work. Now, after New York Times article describing how the Home Depot ignored their own security staff, people might be forced to finally get the bigger picture.
I sometimes think that there should be some sort of intelligence test before we allow people to use certain technologies. I know it is not the most “PC” thought to have, but after reading about how often people are duped with what are obviously scams, hoaxes or other, you really have to wonder about the people that are online. The latest hoax to snare people is aimed at a “hidden” feature in iOS8. This feature is supposed to allow you to wirelessly charge your iPhone using the Microwave and all you need to do it upgrade to iOS8.
As the computer market moves to smaller and smaller form factors the need to decrease the foot print of storage devices is growing. The problem that many manufacturers face is that a reduction in component size has traditionally meant a reduction in performance. This is where technologies like mSATA and M.2 SATA (or M.2 PCIe) come into play. Each of these has a benefit in terms of size and also performance. With mSATA you can maintain close to the same performance that you have with traditional SATA (with the right components), but there are limitations on which motherboards and even mobile devices support this. Now with M.2 (also called M Key) SATA and PCIe devices we are seeing a number of motherboard makers will support for them right out of the box. Because of this interest in these new devices has grown. Today we are taking a look at the first one to hit our lab: the Kingston SM22080S3/120G M.2 SATA drive.
There is a subtle art to influencing people’s opinions and the way that a particular topic is viewed. We have seen multiple attempts at this, some good, some bad. For the marketing savvy it seems that nothing they (or their charges) say can ever be negative. For those that are… less competent the message come out all wrong and often changes the intended push into something very negative. The MPAA and others in the anti-piracy community seem to be in the latter group.
Remember when we told you that BitTorrent was coming out with their very own chat app called Bleep? No well they are and from the information we have so far it is looking like a pretty cool application. The concept is to take basic chat and run it, encrypted, through Torrent swarms. This move, in theory, should prevent the big guys from being able to store or grab your communications in transit.
AMD has been something of an unusual company ever since they first decided to dive into the x86 market with their purchase of NexGen. The would-be CPU maker had an interesting knack of building CPUs that performed well, but were always just a pace behind their rivals. That was the case until AMD pulled off a minor miracle in the form of the Athlon and Athlon64 CPUs. AMD seemed to have stolen the crown from Intel and looked likely to keep it for a long time.
Ever since the take down of Napster the copyright industry has taken a much more aggressive stance on piracy. This stance had taken the form of new laws, increased lobbying and a push to make ISPs responsible for policing everyone’s activities on the internet. They have even sought for, and are still trying to get, trade agreements that allow the US to push their laws onto other countries in the form ACTA and the TPP. Now all of these measures have their seedier side to them, but so far none are exactly illegal (immoral and potentially unethical? That is another question)… At least not until you start looking at some of the trials and arrests that have happened in the last few years.
We have more news from the Snowden front as Der Spiegel reports one a joint NSA, GCHQ program dubbed treasure map. Although the program was originally revealed by the NY Times in late 2013 it was originally described as a network mapping program with no surveillance application. This claim is no longer holding up as more and more information come out about the two agencies plans to map the entire internet in real time.
As the title of this article suggests there is another new video on the internet that claims to show the Windows 9 menu and how it all works. The appearance of the video comes on the heels of more than one alleged screen shot and some other items that have leaked from Microsoft themselves. As we all know Microsoft has a lot riding on the next version of Windows simply because of the lack of consumer acceptance that Windows 8.x has had.