Welcome!

iPhone Authors: Shelly Palmer, Jayaram Krishnaswamy, Jnan Dash, PR.com Newswire, Kevin Benedict

Blog Feed Post

Apple has been Hacked, Twitter Goes Public Secretly, HTC One vs. HD, and more…

By

Today’s Cyber News We Are Tracking: Apple has become one of the top Fortune 500 companies in the US to be hacked.  Twitter is thinking about going public secretly.  Smartphone and tablet maker HTC has introduced their newest phone called HTC One.

Another Fortune 500 Company has been Hacked

Apple has become one of the top Fortune 500 companies in the US to be hacked.  Twitter and Facebook has experienced similar infiltration attacks over the past couple months.  Cyber analysts has narrowed down the origins to a JAVA plug-in vulnerability.  Apple released a statement saying “To protect Mac users that have installed Java, today we are releasing an updated Java malware removal tool that will check Mac systems and remove this malware if found.”  Read More

Should Twitter Go Public Secretly?

Twitter is thinking about going public secretly.  What? How do you go public secretly?  Last year the Jumpstart Our Business Startup Act was signed into US law.  The JOBS Act will allow a company that made less than 1 billion dollars in revenue the opportunity to keep their IPO filings confidential. Read More

HTC One vs. HD

Smartphone and tablet maker HTC has introduced their newest phone called HTC One.  The HTC One is designed to separate itself from the competition by offering a 1080 HD as a standard display.  Imagine shrinking a 40inch 1080 HD television down to the size of your smartphone.  A predefined distance was taken into consideration while making this phone.  If the phone is moved beyond this point the clarity of the picture is lost. Read More

Nuclear Weapons, Hardware Vulnerabilities, and Cyberweapons on Supercomputers

A demonstration is schedule to showcase Sandia National Laboratories capabilities in circumventing a cyber attack against citizens.  Brain electrical activity test will be recorded and displayed on monitors while math problems are being solved.  Each change resulting from the test will indicate a different cyber defender’s skill level.  Another monitor will display huge amounts of email traffic  to detect a potential cyber attack.  During the recent political campaign research was done on who will constitute a cyber attack during the election season. Read More

Building Redundancy Into Your Cloud Outage Strategy

As an IT expert for your organization one of the daunting task is to provide cloud redundancy.  This could be accomplished by following the Amazon Web Service model.  One server is placed at the main facility while the other is placed at an offsite location.  The second server is providing redundancy.  Another solution is to have a configured server on standby but powered down.  Some cloud vendors will not charge for a powered down server.  Read More

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley, former CTO of the Defense Intelligence Agency (DIA), is Founder and CTO of Crucial Point LLC, a technology research and advisory firm providing fact based technology reviews in support of venture capital, private equity and emerging technology firms. He has extensive industry experience in intelligence and security and was awarded an intelligence community meritorious achievement award by AFCEA in 2008, and has also been recognized as an Infoworld Top 25 CTO and as one of the most fascinating communicators in Government IT by GovFresh.