As we all know, the biggest issue with Cloud systems is security, and it is nice to see that there are more and more options becoming available to solve this issue. We had a chance to talk with Nick Stamos, CEO and co-founder of the nCrypted Cloud, located in Boston. It should be noted that this is his 4th startup, and that the last one was also focused on security. The inspiration for the nCrypted Cloud was the case of presidential candidate Mitt Romney, when his Dropbox and mail accounts were hacked, and the most ridiculous part of the story is that the hacker only had to guess the name of the Romney's pet to enter his account.
The news is all abuzz with the compromise of the Tor (Originally The Onion Router) Network. This network has been used by a wide variety of people who are looking for a degree of anonymity. It relies on the use of different entry and exit point to prevent someone from identifying your exact IP Address or MAC address. In-between these point there are different hops that further confuse the trail. In basic terms your system is masked by the exit point which is selected randomly by the system. Now in addition the anonymity services for individual users there are also servers that host websites and even anonymous email services. Some have called this the “dark net” or “deep web” although that is not actually the case (the dark net is something else entirely). Many of these sites are legitimate sites that need to protect their readers from less than understanding authorities, but there are a larger number that are not above board at all including many sites that host child pornography.
At one of the presentations at the security conference BlackHat USA 2013, researchers from the American University George Tech have demonstrated a method of hacking the iPhone by using seemingly safe charger to charge the battery. Billy Lau, Yeongin Jang and Chengyu Song took advantage of the failure to charge that allowed them to connect to the USB port on any iPhone, bypassing security mechanisms that prevent arbitrary installation of the software, and finally install their own harmful programs. These programs can then be transferred and hidden in the same way as Apple hides their own built-in apps.
Nintendo has released their quarterly business results which show that in the three months that ended in late June they only sold 160,000 pieces of their game console Wii U.
The X79 platform will soon become the latest collection of Intel's ultra high-end CPU processors. The line will be launched on 6th of September this year and first processors that will occur are the Core i7-4960X, Core i7-4930K and Core i7-4820K.
Page 251 of 570