AMD mulls custom ARM 64-bit server chips

By GIXnews

By Agam Shah, IDG News Service | August 11th, 2014 AMD said it will customize 64-bit ARM server chips for customers, but first needs to see how the market evolves. Advanced Micro Devices may be willing to make custom ARM server chips for customers, much like it made custom chips for the Xbox One and…

Google backs $300 million undersea Internet cable to Japan

By GIXnews

By Zach Miners, IDG News Service | August 11th, 2014 The system will help Google connect its data centers in Asia and the US. Google is joining forces with five Asian telecommunications firms to build and operate an underwater cable system from the U.S. to Japan to support rising bandwidth usage and better link its…

15 technologies changing how developers work

By GIXnews

By Peter Wayner, InfoWorld | August 11th, 2014 A long time ago, developers wrote assembly code that ran fast and light. On good days, they had enough money in their budget to hire someone to toggle all those switches on the front of the machine to input their code. On bad days, they flipped the…

Microsoft pitches Windows for Internet of Things to maker community

By GIXnews

By Agam Shah, IDG News Service | August 11th, 2014 Microsoft has started shipping a Galileo board with custom Windows OS. Hoping to cover all its bases in the emerging Internet-of-Things market, Microsoft is proffering a helping hand to “makers,” DIYers, hardware hackers and other builders of things that may one day end up on…

New security tools from Tenable, HP, Co3 attempt the impossible

By GIXnews

By John Breeden II, Network World | August 11th, 2014 Automated incident response promises total network security by combining threat detection, prevention and response. Automated incident response is one of the fastest growing fields in computer security. Alternatively called threat monitoring, vulnerability management or threat management, it encompasses the seemingly impossible task of defending a…

Mobile chips face lockdown to prevent hacks

By GIXnews

By Agam Shah, IDG News Service | August 11th, 2014 Chip makers are adding more security layers to protect mobile device users from malicious attacks and code injection. Chip makers want to make hardware the first layer of defense against data breaches and other attacks on tablets and smartphones. Mobile devices are becoming increasingly vulnerable,…

Energy harvested from body, environment could power wearables, IOT devices

By GIXnews

By Agam Shah, IDG News Service | August 10th, 2014 Low-power wearables may soon bid adieu to batteries and start drawing energy generated by body heat and movement, and ambient energy from the environment. Consumer electronics devices are getting smaller but conventional batteries are not, and it’s important to start implementing new energy harvesting techniques…

Many home routers supplied by ISPs can be compromised en masse, researchers say

By GIXnews

By Lucian Constantin, PCWorld | August 10th, 2014 Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn. By gaining access to such servers, hackers or intelligence agencies could potentially compromise millions of…

Seven ways DARPA is trying to kill the password

By GIXnews

By Martyn Williams, IDG News Service | August 8th, 2014 From analyzing the way you walk to your heartbeat, these futuristic authentication systems could be here soon. A seemingly constant stream of data breaches and this week’s news that Russian hackers have amassed a database of 1.2 billion Internet credentials has many people asking: Isn’t…

Does your business need a “Data Protection Officer?”

By GIXnews

By Ellen Messmer, Network World | August 8th, 2014 Anticipated new EU regulation may mean you do, notes consultancy PricewaterhouseCoopers. New data-privacy regulation for the European Union expected to gain approval as early as October of this year would break new ground by requiring businesses selling goods and services to European citizens to appoint a…

PCI Security Council moves to boost service providers’ credit card security

By GIXnews

By Jaikumar Vijayan, Computerworld | August 8th, 2014 Growing use of outsourcing companies by merchants drives need for stronger controls. The Payment Card Industry Security Standards Council (PCI SCC) has updated its guidance to help merchants better determine whether third party service providers have implemented security measures to protect credit and debit cardholder data. The…

Scientists create self-assembling, working robots

By GIXnews

By Sharon Gaudin, Computerworld | August 8th, 2014 These origami robots can fold up and walk away. It would be strange enough to see a robot fold itself into arbitrary shapes and then just walk away. Then add to the mix that it’s a laser-cut origami robot and you have the new robotic technology created…

The Internet of Things Brings Far-Reaching Security Threats

By GIXnews

By Kenneth Corbin, CIO | August 8th, 2014 Bringing new devices online at home and in the enterprise raises a host of security concerns that will require a more hands-on rethinking. WASHINGTON Security pros routinely cite poor cyber hygiene as one of their top concerns. But if they’re lying awake at night worried about lazy…

How hackers used Google in stealing corporate data

By GIXnews

By Antone Gonsalves, CSO | August 7th, 2014 A group of innovative hackers used free services from Google and an Internet infrastructure company to disguise data stolen from corporate and government computers, a security firm reported. FireEye discovered the campaign, dubbed Poisoned Hurricane, in March while analyzing traffic originating from systems infected with a remote…

Facebook moves to protect user data with PrivateCore buy

By GIXnews

By Sharon Gaudin, Computerworld | August 7th, 2014 Cybersecurity startup PrivateCore’s tech can help prevent hackers — or anyone — from accessing Facebook user data. Facebook Thursday moved to beef up its servers by agreeing to buy cybersecurity startup PrivateCore. Oded Horovitz, co-founder and CEO of PrivateCore, announced the acquisition in a blog post on…

New Feature in Cumulus Linux 2.2: sFlow

By GIXnews

sFlow is an open protocol, newly supported in Cumulus Linux 2.2, that enables a collector to determine what is going on in a complex network. It is used to collect statistics, such as packet counts, error counts, CPU usage, etc from a large number of individual switches. What is especially interesting is that it can…

IBM’s new brain chip could power the Internet of things

By GIXnews

By Joab Jackson, IDG News Service | August 7th, 2014 The IBM TrueNorth brain-inspired prototype processor offers the equivalent of 256 million synapses. IBM has taken another step toward its ambitious goal of creating a processor that acts like a human brain, creating a second, more advanced chip that mimics the way the mammalian brain…

Black Hat keynote: U.S. should buy up zero day attacks for 10 times going rate

By GIXnews

By Tim Greene, Network World | August 7th, 2014 Dan Greer has other suggestions to improve cyber security that will make software vendors ‘yell bloody murder’. Las Vegas — The U.S. government should pay 10 times the going rate for zero-day software flaws in order to corner the market and then make those vulnerabilities public…

Big tech firms back Wi-FAR for remote broadband

By GIXnews

By Matt Hamblen, Computerworld | August 7th, 2014 802.22 standard, approved in 2011, promises low-cost broadband for remote areas. Google, Microsoft and Facebook are cranking up an emerging wireless technology known as Wi-FAR to help reduce the digital divide in remote and unconnected regions of the world. Wi-FAR is a recently trademarked name from the…