LAS VEGAS – Netflix has long been the poster child for being an “all-in-the-cloud” organization. The streaming media service relies on Amazon Web Services (AWS) for infrastructure and computing resources…
Back in 1999, Eric Raymond coined the term “Linus’ Law,” which stipulates that given enough eyeballs, all bugs are shallow. Linus’ Law, named in honor of Linux creator Linus Torvalds,…
The notion of edge computing is a relatively nascent one in modern IT. While end user, data center and cloud computing are well understood, Edge computing is still struggling to…
There are a lot of different security technologies for consumers, and most of them cost money to use. Avast is an exception to that norm, offering fully-functional, free anti-virus security…
Cryptojacking has become one of the most active and pervasive threats in recent years. In a cryptojacking attack, a cryptocurrency mining script is injected into a server or a webpage…
Bugs exist in software. That’s a fact, not a controversial statement. The challenge (and controversy) lies in how different organizations find the bugs in their software. One way for organizations…
Are your systems running slower than they should? Perhaps a certain web page is more sluggish than usual and your system seems to lag. Be concerned – you could potentially…
TORONTO — Blockchain has been hailed by some in the technology industry as a potential method to help improve cyber security. However, security researcher Majid Malaika warns that Blockchain…
Boo! On Oct. 31, the open-source WordPress content management (CMS) and blogging platform released its 4.8.3 update, patching a frightening SQL Injection security vulnerability that was left open for weeks.…
New research presented at the USENIX conference is providing deep insight into the evolution of the Mirai botnet over a seven-month period. The Mirai botnet first achieved notoriety in September…