- Welcome Guest
- Sign In
Google's Nest line of smart home products will be combined with ADT's security services in a partnership announced Monday by the two companies. As part of the agreement, Google will invest US$450 million into ADT to acquire a 6.6 percent interest in the security and smart home solutions provider. Th...
Like a lot of you, last week I watched the congressional testimony from the CEOs of Amazon, Apple, Facebook and Google -- and there were a lot of apparent things that were problematic. One is that there are folks in Congress that likely shouldn't be in Congress, and another is that each company has ...
When WWII broke out on Sept. 1, 1939 with Germany's invasion of Poland, few could have expected the technological leaps that would occur over the next six years. The true lasting impact of the technological advances of the Second World War are seen in the ability to take commercial jets around the w...
Google's domination of the online ad market appears to have stalled since Amazon last year became the third-largest digital ad platform in the U.S. behind the Google-Facebook duopoly. This may have driven Google to accelerate its push into e-commerce, focusing on what it calls the "messy middle" -- ...
U.S. government agencies will remain active in the information technology market, despite the impact of COVID-19 on agency operations. In fact, there is evidence that the occurrence of the virus has spurred agencies to improve IT resources. For example, the General Services Administration in early J...
The move by retailers to online and mobile selling to survive the pandemic has resulted in a significant increase in digital fraud activity. The "2020 True Cost of Fraud Study: E-commerce/Retail Edition" by LexisNexis Risk Solutions found this to be partly because some fraud control systems are outd...
If you are a Windows or Linux user, brace yourself for a long siege of vulnerability nightmares. The fix will be long and treacherous and could brick your computers. Eclypsium researchers have detailed a set of newly discovered vulnerabilities dubbed "BootHole" that opens up billions of Windows and ...
Amazon's Alexa mobile app has a new look. The company on Monday introduced an updated version of the app that aims to give users a more personalized experience and moves all third-party "skill" suggestions off the main screen. The app is being rolled out this month for iOS, Android and Fire devices,...
Garmin on Monday confirmed that many of its online services have been disrupted by a cyberattack on its systems that occurred on July 23, 2020. Services disrupted by the attack, which encrypted data on the systems, included website functions, customer support, customer facing applications, and compa...
Contract disputes do arise from time to time. Whether the issue is early termination, delay of deliverables, breach of performance, or the like, it is best to plan for the worst and hope for the best. When there is a dispute, whether the contract contemplates this or not, either party should conside...
Our infrastructure wasn't set up to suddenly shift massive amounts of traffic from companies to homes. Exacerbating this are cable networks with shared capacity because they were built with the idea that most folks wouldn't be using them at the same time. 5G might be the only realistic way to deal w...
The information security industry, with all its raging debates, has rallied around a small corpus of best practices. One of the highest on this list is full-disk encryption, which security experts regard as sacrosanct. This is the encryption that ensures that someone who snatches your device won't b...
Even when the world has been upended, a home garden can provide a bit of food insurance. Many people are finding that gardening offers a way to take control of a situation that can sometimes feel chaotic and unpredictable.
Counterfeit hardware, especially in corporate settings, is a recurring problem that often goes unnoticed. Having such gear online poses serious financial, operational, and security risks. Cybersecurity company F-Secure has released an investigative report detailing counterfeit Cisco Catalyst 2960-X...