IT Pro

0

Mega breaches often garner the biggest headlines. Target in 2013 signalled the start of this, but since then we've seen Yahoo!, our own Red Cross Blood Bank, the US Department of Personnel Management and others suffer data exfiltration either by malicious parties or through human error. But something more troubling has been happening and it has me worried. Many of the protocols we rely on are under threat.

0

Kik Messenger is a popular messaging platform used by about 15 million people each month. And that makes it a place that can be leveraged into a marketplace. From its humble beginnings as a way for Blackberry, Android and iOS users to seamlessly message, it is trying to broaden its horizons as it has been overtaken by WhatsApp, Facebook Messenger and others. The next addition to the Kik platform will be a cryptocurrency called Kin.

0

After 20 years at Intel, with the last five of those as CEO, Kate Burleigh is moving on from the world's most well-know chip maker to pursue new opportunities outside the company. Kate Burleigh has led the Australian and New Zealand businesses, having made the shift from sales and marketing roles.

0

While the forensic analysis of this weekend's British Airways outage is still some time away, the airline's woes are a good reminder of why we need robust systems in place to protect the systems and data that underpin our businesses. I spoke with Zerto's Vice President, Andrew Martin, for the Asia Pacific and Japan (APJ) region about the challenges business face and what they can do.

0

Over the weekend, British Airways IT systems had a meltdown resulting in the cancellation of all services out of Heathrow and Gatwick airports. While this sort of issue would be a major issue on a quiet day, the fact it happened on a long weekend exacerbated the situation. Australian Business Traveller says it could cost the airline a pretty penny as passengers can make claims for compensation for sums ranging from €250 (A$375) through to €600 (A$900) per passenger under EU law.

6

The US Department of Homeland Security's head honcho John Kelly, says his department is seriously considering a total ban on laptops in the passenger hold for all flights in and out of the land of the so-called free. During an interview on the bastion of unbiased news coverage, Fox News, Kelly was asked whether the laptop ban that currently affects flights from some Middle Eastern and African countries will be expanded. While being non-committal, haying he might be considering an expansion of the ban, he didn't rule it out.

1

Online is where it's at when it comes to learning resources for programming, especially for languages used primarily for web. Sometimes however, you just want a solid, consistent experience you can read without necessarily needing an IDE open in front of you and that's where eBooks reign supreme. Fortunately, O'Reilly has you covered with 36 free coding titles.

0

In a typical year, I'll travel internationally five to seven times and interstate 15-25 times. With many of the domestic trips being day trips, all up I spend over a hundred days on the road. And I've been doing that for the last three or four years. Over that time I've refined my traveling routine, learning from my mistakes and adapting to the changing security rules at airports. Here's what I carry.

1

For as long as I can remember, PC makers have been looking for a single cable/connector combination that can be used for video, peripherals, power and other I/O functions. Thunderbolt 3 with USB-C connectors brings us close to realising that dream. And to help with that Intel is planning to do two things: integrate Thunderbolt 3 into CPUs and releasing the Thunderbolt Protocol Specification to industry.

0

WordPress blogs are complex pieces of software with a threat surface that expands with each plug-in or theme you install. Whenever I set up a new WordPress site, one of the first things I install is Wordfence - a security plug-in that provides a number of services that help me monitor and manage those sites. Wordfence has launched a WordPress Security Audit service.

1

One of the primary vehicles used by bad guys to access our systems is stealing log-in credentials in order to impersonate real users. All the security processes and tools in the world are circumvented when someone has your username and password. That's where two-factor authentication (2FA) comes into play. 2FA works by adding another authentication challenge to the equation. It's not just about what you know - your password, it's also about something you have. That's where the authenticator apps from Microsoft and Google come into play.

2

Samsung and Apple have enjoyed dominance of the smartphone market for some time. But that is changing according to data from Gartner. Both companies saw their quarterly shipments fall compared to the same period last year with their rivals Huawei, Oppo and Vivo all showing solid growth over the same period.