General

Last Updated on 23 Oct. 2015, Total: 168 Blog Posts

  1. Fake Skype malware app on Android

    Days after Trend Micro, a global leader in antivirus solutions broke the news of a fake Skype malware app for Android devices, Microsoft acknowledges the existence of the malware and releases an alert notification on its Malware Protection Center website. It urges users of Android phones to install security software or download the latest updates for those who already have... Read More

  2. Five Don’ts for SysAdmins: Bad Habits that Can Decrease Your System Efficiency

    Netwrix joins the madness of the forthcoming SysAdmin Day and offers some typical bad advice that no system administrator should ever follow... Read More

  3. Flexible Battery revealed by Korean Scientists

    The limitation in physical flexibility of portable devices can be defeated thanks to a super-thin and flexible battery invented by Korean scientists. The battery which seems to be commercially viable, can lead to gadgets that can be folded away into your pocket. The battery remains one of the largest single parts of any portable device but this lithium-ion battery is... Read More

  4. Going Green – Choosing an Efficient Data Center

    By Kevin Leahy, Group General Manager, Data Center Business Unit, Dimension Data... Read More

  5. Google’s Cloud Playground

    In literally two clicks, you can start a development project in the cloud, see its code, and start playing with an app on Google’s App Engine, Compute Engine, or Datastore... Read More

  6. Google’s rendering-based indexing best practices

    Google’s Webmaster Guidelines update for optimal indexing in view of the recently announced change of rendering web pages more like a typical modern browser rather than as a text-only browser... Read More

  7. Greenpeace's Guide to Greener Electronics

    This 18th edition of Greenpeace's Guide to Greener Electronics evaluates leading consumer electronics companies based on their commitment and progress in three environmental criteria: Energy and Climate, Greener Products, and Sustainable Operations. The Guide scores companies on overall policies and practices – not on specific products – to provide consumers with a snapshot of the sustainability of the biggest names... Read More

  8. HNAP - the flexible and extensible light weight protocol

    HNAP was designed to be a simple, light weight protocol that is easy to implement inside of small cost-constrained hardware such as network routers, cameras and other small devices... Read More

  9. HTTPS sessions can be hijacked!

    Security researchers discovered that even HTTPS encryption that is used for secure connections throughout the Internet can allow attackers to hijack web browser sessions that support SPDY or TLS compression. SPDY is an open networking protocol used by Google and Twitter. This security weakness can be exploited when web sessions are protected by SSL or TLS and are using one... Read More

  10. Handling Destructive Malware

    The US Computer Emergency Readiness Team (US-CERT) has published a security tip on how to handle destructive malware... Read More