Facebook iconTwitter icon
B2B-Network:
Latest Articles
Building Bridges between Learners and Tech Superstars
Open uri20150421 475075 18extmq

The Internet of Everything (IoE) is a concept that has catalysed some potent techniques for carrying the internet of things into the lifes of all communities across the world. ModKit is among the most exciting developments of the movement. It’s designed to open up the world of programming to learners who are either young or young at heart. With a what-you-see-is-what-you-get interface, you simply need to drag and drop objects in order to create microcontrollers and real world devices.

Because the language is event-based, users can learn to code intuitively, picking up the syntax...

» Read more
Android Apps May No Longer Require Passwords
Smartphone header

This June, Google's Project Abacus, which was launched at a conference last year, is expected to see real-world tests. Last week, Dan Kaufman, Google's director of Advanced Technology and Projects group, announced that several major financial organisations are involved in the trial, and will start testing a Trust Application Programme Interface (API) that offers an alternative to passwords, using machine intelligence for user authentication purposes. The outcome of the forthcoming test could mean that the Trust API will become widely available by this December. 

Face...

» Read more
Advanced Network Security Measures with AlienVault
Untitled 1

Network security is an element that businesses and organisations take very seriously. A lot of operations and communications go through different networks and it is necessary to ensure that the right protection is available. AlienVault caters to this need by providing companies with threat detection products. With so many threats out there, it has become necessary to undertake stricter network protection measures. 

What it Offers
AlienVault’s USM (Unified Security Management) platform offers more advanced features than a typical, SIEM device. Any IT professional that wants to...

» Read more
The Brave New World of Biometric Eye-Scans
Gfx033

As we hurtle forward through the second decade of the 21st century, technology is advancing at an ever increasing rate. Technology that was once thought the preserve of sci-fi movies is now set the become reality, and there are few examples more pertinent in this regard than biometric eye-scanning.

Since John Daugman patented his iris-recognition algorithm in 1991, the writing has been on the wall: the practical application of these scans, after all, has always been blatantly evident. While many of us regarded the introduction and widespread use of such biometric systems as inevitable,...

» Read more
The Return of the Malicious Attachment
Open uri20150421 486776 1ielvw

Malicious attachment is malware embedded into often innocuous looking email attachments. When the user clicks and opens the attachment, the malware downloads into the system and wrecks it.

The low costs it takes to blast emails, the ability of attachments to evade signature and reputation based filters, and their resilience, not being dependent on vulnerabilities in the operating system or code, make malicious attachments the favourite of cyber criminals. They are cross-platform as well.

The spate of high profile botnet takedowns, and improved email filtering capabilities that saw an...

» Read more
Simply Clueless: Most People Aren't Afraid of Ransomware
Viren header

In a recent survey covering 3,000 computer users in USA and Canada, up to 85% of people said they weren't afraid of ransomware. Specifically they pointed out their refusal to pay a ransom, should they ever find their computer has been hi-jacked by ransomware. This is good! There are legitimate ways to get rid of this problem without endorsing the criminals behind it. However…

As many as 70% of the interviewed users admitted they don't actually know what is ransomware. This is not so good, since it suggests most users simply aren't afraid of this potential issue due to...

» Read more
Bayometric Touch N Go
Gfx031

Fingerprint Recognition API for Software Developers is Easy with Touch N Go

Bayometric Touch N Go is a fingerprint recognition API for apps. Interested business customers can request a demo from the Bayometric website and deal direct with engineers to access further information about the product. If you're planning the purchase of fingerprint scanners for any business operations, this could be a reliable API which provides everything needed at a budget price. 

Software developers looking to add biometrics to web portals or applications will find it's a simple matter to use...

» Read more
The point solution conundrum
Open uri20150309 2214024 grdgko

The cyber security industry has many new technologies to fight the latest threats. Security, with mobile users and Cloud technology, is now more complex and hackers can overcome most security devices. 

Worldwide security spending exceeded $75bn in 2015 with many security companies battling to be ahead. IT teams face problems to understand the various point solutions available. These make networks more complex for IT teams with regards to security and complex networks lead to increased vulnerability.

When networks merged with the Cloud and incorporated mobile users, the network...

» Read more
Mobile Security - A priority in the modern age
Open uri20150408 4069260 13cd6fv

Whilst improving mobile security it is an IT department’s job to improve efficiency at the same time. It is not enough to simply build walls around an enterprise when so many companies are heavily reliant on the internet and outside collaboration. 

Mobile Security Should Not Hinder Business Processes
It is possible to use mobile devices to engage with new and existing customers using an efficient and flexible approach. Businesses both cannot afford to hinder this process with restrictive mobile security, or risk allowing mobile technology and mobility to provide chinks in their...

» Read more
TeslaCrypt Bigger, Stronger and Unbreakable
Open uri20150309 2214024 1fci5g2

The TeslaCrypt ransomware has heightened its code to include stronger encryption. The initial design of TeslaCrypt was meant to target computers that have computer games installed, but now offers a wider purview. TeslaCrypt Trojan encrypts files and locks victims from accessing theimuntil a ransom is paid for the decryption key to be issued. This ransom amount may range from $150 to $1000 worth of bitcoins depending on the files encrypted. 

Spam campaigns purporting to offer visa benefits have been used widely for the spread of the TeslaCrypt ransomware, which has affected many people...

» Read more

<< Older posts
Loader