有个足球雷竞技app网络世界 //m.amiribrahem.com EN-US 2020年4月17日星期五21:00:28 -0700 2020年4月17日星期五21:00:28 -0700 https://idge.staticworld.net/nww/networkworld510x510.png 有个足球雷竞技app m.amiribrahem.com 510 510 https://idge.staticworld.net/nww/networkworld798x288.png 有个足球雷竞技app m.amiribrahem.com 796 288 如何处理在Twitter机器人危机 06:19:00 -0700 约翰·布兰登 约翰·布兰登

你可能已经遇到这些机器人几次了。看起来像真人的东西可能是机器人给你发垃圾信息……甚至更糟。< p class = " jumpTag " > < a href = " /文章/ 3188628 / how-to-deal-with-the-bot-crisis-on-twitter。要完整阅读这篇文章,请点击这里

(内幕故事)
//m.amiribrahem.com/article/3188628/how-to-deal-with-the-bot-crisis-on-twitter.html IDG内幕
如何AI正在停止实时犯罪的黑客 04:35:00 -0800 约翰·布兰登 约翰·布兰登

Almost every day, there’s news about a massive data leak -- a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around, but it can be a losing battle.

Yet, there is one ally that has emerged in recent years. Artificial intelligence can stay vigilant at all times, looking for patterns in behavior and alerting you to a new threat.

To read this article in full, please click here

//m.amiribrahem.com/article/3165232/how-ai-is-stopping-criminal-hacking-in-real-time.html
为什么公司会提供黑客赏金 2017年1月5日星期四04:45:00 -0800 约翰·布兰登 约翰·布兰登

Want to make a cool $20,000?

All you have to do is hack the Nintendo 3DS, a handheld console that’s been out for a few years already. A listing on HackerOne spells everything out: Hackers will receive a cash payment for discovering a vulnerability in the system, which does let gamers make purchases and stores private information like your age and gender. There’s a range for this, of course -- some discoveries will pay $100. Also, anyone who files a report must follow the exact template.

It makes you wonder -- why would a major Japanese corporation offer a reward like this? Why is it even worth the expense, especially when you know they have internal security researchers?

To read this article in full, please click here

//m.amiribrahem.com/article/3154833/why-companies-offer-a-hacking-bounty-and-why-there-are-challenges.html
社交媒体黑客的兴起对你的生意意味着什么 2016年12月8日星期四08:42:00 -0800 约翰·布兰登 约翰·布兰登

A product marketing manager at your company just posted a photo on LinkedIn. The problem? In the background of the image, there’s a Post-It note that contains his network passwords. You can barely see it, but using artificial intelligence algorithms, hackers can scan for the publicly available image, determine there are network passwords, and use them for data theft.

According to data security expert David Maynor, this is not rocket science. In fact, the AI program is easier to use than a search engine. “The AI can identify objects in an image and the environment of the photo, guess at a description of the image contents as well as your likely age, gender, facial expression, and more,” says Maynor. “And these tools are becoming increasingly powerful with every image they scan, learning and becoming more accurate.”

To read this article in full, please click here

//m.amiribrahem.com/article/3148298/what-the-rise-of-social-media-hacking-means-for-your-business.html
如何安全是家用机器人? 2016年11月3日星期四05:18:00 -0700 约翰·布兰登 约翰·布兰登

他们有闪烁的灯,并倾向于啁啾不断。其中一个可以定时为你的客厅地毯吸尘。另一个可以用人工智能和孩子们玩游戏。< p class = " jumpTag " > < a href = " /文章/ 3138407 / how-secure-are-home-robots。要完整阅读这篇文章,请点击这里

(内幕故事)
//m.amiribrahem.com/article/3138407/how-secure-are-home-robots.html IDG内幕
保障您的协同软件 星期二,2016年10月4日四点48分00秒-0700 约翰·布兰登 约翰·布兰登

你的安全基础设施现在有一个大洞。前门开着,侧窗半掩着,保险柜开着,闪烁的霓虹灯上写着“偷我的数据”。虽然您可能已经锁定了用于此软件的网络,制定了严格的使用策略,并坚持要求用户使用复杂的密码,但数据正在泄漏。< p class = " jumpTag " > < a href = " /文章/ 3127389 / security-for-your-collaborative-software。要完整阅读这篇文章,请点击这里

(内幕故事)
//m.amiribrahem.com/article/3127389/security-for-your-collaborative-software.html IDG内幕
这款昂贵的“安全”手机告诉了我们关于手机黑客的什么 2016年9月6日星期二05:21 -0700 约翰·布兰登 约翰·布兰登 <文章> <节类=“网页”>

移动安全是有点不恰当的。我们几个可以说,我们已经通过了一个恶意软件攻击或已隔离的实际的病毒。赔率是堆放反对我们。Mobile operators like Verizon and Sprint routinely scan for threats, and both Google Android and the Apple iPhone include multiple security measures on their devices, from fingerprint scanners to full encryption.

Yet, there’s a sneaking suspicion that mobile security is a bigger concern. According to one HP report, 67 percent of employees in the U.S. now work remotely. We’re relying on phones more and more. We store sensitive business documents on them and use them to make purchases.

To read this article in full, please click here

//m.amiribrahem.com/article/3116904/what-this-expensive-secure-phone-tells-us-about-mobile-hacking.html
你应该了解笔记本电脑的安全趋势 2016年8月3日星期三05:08:00 -0700 约翰·布兰登 约翰·布兰登 <本文> <节课=“页面”>

对于大多数企业用户来说,有一个共同的设备,我们都使用仍然是黑客的常见攻击向量。我们进行他们与我们无处不在,我们大部分的重要文件保存在本地驱动器上,哪怕只是暂时的。A laptop has more storage, more connection options, and more legacy apps than any smartphone or tablet.

For any business, it’s important to take laptop security seriously, even if you already have an endpoint security product in place and teach enterprise users about best practices. Hackers are industrious; they develop new techniques and know that one of the easiest ways to steal passwords, break into file archives, and intercept a confidential email is through a laptop.

To read this article in full, please click here

//m.amiribrahem.com/article/3103889/4-laptop-security-trends-you-should-know-about.html
为什么Verizon和雅虎的合并会像微软抢购CompuServe一样 周五,2016年7月22日13:30:00 -0700 约翰·布兰登 约翰·布兰登

Wait, what?

If this rumor about Verizon buying Yahoo for $5B is true, we have an honest to goodness schadenfreude moment for me as someone who remembers the days of the Buddy List, giant banner ads (which is actually still common at Yahoo Mail for some reason), and those plastic discs they might still sell at Walmart for gaining “high-speed Internet” access.

As you may know, Verizon also owns AOL. Those three letters, combined with the Yahoo exclamation mark, create some vivid memories. Few of them are good ones. I remember having to wait for my modem to connect to AOL back in the day, and for the banner ads at Yahoo.com to finish loading. It’s a curious development, but it makes about as much sense as other luminous icons of tech combining into an ungodly entity driven by brand dominance.

To read this article in full, please click here

//m.amiribrahem.com/article/3099193/why-an-verizon-and-yahoo-merger-would-be-like-microsoft-snapping-up-compuserve.html
10旅游应用程序顺利您下一次商务旅行 2016年7月15日星期五04:51:00 -0700 约翰·布兰登 约翰·布兰登 <文章类=“幻灯片”> <图类=“幻灯片”> < figcaption >前方晴朗< / figcaption > < img data-imageid = " 100670976 " src = " http://images.techhive.com/images/article/2016/07/intro_ -标题- 100670976 - orig.jpg”data-thumb-src = " http://images.techhive.com/images/article/2016/07/intro_ -标题- 100670976 - orig.jpg“alt = "智能应用光滑的商务旅行" / > < p class = " slideCredit " >图像类< span = " slideCreditText " >思想库< / span > < / p > < div class = " slideBody " > < p >有时似乎生意旅行是专门用来提高血压的。取消的航班、长长的机场安检队伍、甚至是乱放的报销单都可能给你的旅行带来麻烦。为了帮助解决这个问题,我们搜集了一些手机应用程序,这些应用程序可以以多种方式减轻旅行压力,从预订机票或在最后一刻预订酒店房间,到寻找安静的机场休息室或安全的Wi-Fi热点。除了一个例外,我们所有的选择都适用于iOS和Android设备,而且很多都是免费的。< / p > < p class = " jumpTag " > < a href = " /文章/ 3095800/10-travel-apps-to-smooth-your-next-business-trip。要完整阅读这篇文章,请点击这里

//m.amiribrahem.com/article/3095800/10-travel-apps-to-smooth-your-next-business-trip.html
是你的车安全吗?也许不是,但企业用户仍然可以学到东西 2016年7月5日星期二05:46:00 -0700 约翰·布兰登 约翰·布兰登

If you're looking for a good lesson in enterprise security, there might be a few sitting in the parking lot. The automotive field is a glaring example of "worst practices" in security, say several automotive experts. And, the problem is only getting worse, not better.

Over the past few years, the cars have come under fire for many things -- constant recalls, safety hazards, and diesel-engine tricks to name a few-- but security experts have noticed a disturbing trend.

While it might be hard to break into a BMW unless you have a rock handy, there hasn't been as much effort in protecting wireless signals, establishing standards, creating new regulations and laws, and patching much more aggressively.

To read this article in full, please click here

//m.amiribrahem.com/article/3091711/is-your-car-secure-maybe-not-but-enterprise-users-can-still-learn-something.html
计算机建模如何建立2016年凯迪拉克CT6 2016年6月22日星期三06:04:00 -0700 约翰·布兰登 约翰·布兰登

汽车世界比以往任何时候都更依赖于建模。汽车制造商现在使用更多的铝部件;车辆上有复杂的电脑,经常互相配合工作;在这个司机分心的时代,人们越来越需要让汽车更安全。< p class = " jumpTag " > < a href = " /文章/ 3087149 / -计算机建模- - - 2016 -凯迪拉克ct6建造。要完整阅读这篇文章,请点击这里

(内幕故事)
//m.amiribrahem.com/article/3087149/how-computer-modeling-built-the-2016-cadillac-ct6.html IDG内幕
物联网设备的安全问题日益受到关注 2016年6月1日星期三05:02:00 -0700 约翰·布兰登 约翰·布兰登

The burgeoning market for gadgets that trigger a sprinkler system, help you count the number of times you swing a bat, or dim the lights automatically are rising.

That’s a concern for any business due to how these devices are also starting to show up at the corporate office for use in conference rooms, executive suites, and even as a low-cost building security camera system. Experts claim the industry is not doing enough to protect these devices.

To read this article in full, please click here

//m.amiribrahem.com/article/3077486/security-concerns-rising-for-internet-of-things-devices.html
IT领导者如何应对最棘手的技术挑战 2016年5月17日星期二06:51:00 -0700 约翰·布兰登 约翰·布兰登

People who lead large IT organizations don’t have much time to deal with the nitty-gritty technical details of how their systems run. Their priorities are to provide strategic technology leadership, set policies and manage the overall operation. CIOs and other IT leaders also have to work with executives in other departments to make sure IT is providing the services the business needs. But there are times when a technical problem crops up that requires the boss’s attention, and on those occasions finding the right solution can seem like an overwhelming challenge.

To get a sense of the type of technical issues CIOs have to deal with, we asked five IT leaders to recall vexing problems they were able to solve without resorting to complicated, high-cost rollouts.

To read this article in full, please click here

//m.amiribrahem.com/article/3071524/how-5-it-leaders-beat-their-toughest-technical-challenges.html
5位安全专家分享了他们对于“边缘”设备的最佳建议 2016年5月10日,星期二11:13:00 -0700 约翰·布兰登 约翰·布兰登

What is a ‘fringe’ device in IT?

For some, it’s a gadget everyone has forgotten about — a printer in a corner office, an Android tablet in a public area used to schedule conference rooms. A fringe device can also be one that’s common enough to be used in the office yet not so common that everyone is carrying one around or has one hooked up to the Wi-Fi every day.

As with any security concern, many of these devices are overlooked. There might be security policies and software used to track and monitor iPads and Dell laptops, but what about the old HP printer used at the receptionist’s desk? In a hospital, it might be a patient monitoring device. In a more technical shop, it could be a new smartphone running an alternate operating system.

To read this article in full, please click here

//m.amiribrahem.com/article/3068410/5-security-experts-share-their-best-tips-for-fringe-devices.html