Today’s Cyber News We Are Tracking: Apple has become one of the top Fortune 500 companies in the US to be hacked. Twitter is thinking about going public secretly. Smartphone and tablet maker HTC has introduced their newest phone called HTC One.
Another Fortune 500 Company has been Hacked
Apple has become one of the top Fortune 500 companies in the US to be hacked. Twitter and Facebook has experienced similar infiltration attacks over the past couple months. Cyber analysts has narrowed down the origins to a JAVA plug-in vulnerability. Apple released a statement saying “To protect Mac users that have installed Java, today we are releasing an updated Java malware removal tool that will check Mac systems and remove this malware if found.” Read More
Should Twitter Go Public Secretly?
Twitter is thinking about going public secretly. What? How do you go public secretly? Last year the Jumpstart Our Business Startup Act was signed into US law. The JOBS Act will allow a company that made less than 1 billion dollars in revenue the opportunity to keep their IPO filings confidential. Read More
HTC One vs. HD
Smartphone and tablet maker HTC has introduced their newest phone called HTC One. The HTC One is designed to separate itself from the competition by offering a 1080 HD as a standard display. Imagine shrinking a 40inch 1080 HD television down to the size of your smartphone. A predefined distance was taken into consideration while making this phone. If the phone is moved beyond this point the clarity of the picture is lost. Read More
Nuclear Weapons, Hardware Vulnerabilities, and Cyberweapons on Supercomputers
A demonstration is schedule to showcase Sandia National Laboratories capabilities in circumventing a cyber attack against citizens. Brain electrical activity test will be recorded and displayed on monitors while math problems are being solved. Each change resulting from the test will indicate a different cyber defender’s skill level. Another monitor will display huge amounts of email traffic to detect a potential cyber attack. During the recent political campaign research was done on who will constitute a cyber attack during the election season. Read More
Building Redundancy Into Your Cloud Outage Strategy
As an IT expert for your organization one of the daunting task is to provide cloud redundancy. This could be accomplished by following the Amazon Web Service model. One server is placed at the main facility while the other is placed at an offsite location. The second server is providing redundancy. Another solution is to have a configured server on standby but powered down. Some cloud vendors will not charge for a powered down server. Read More