サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
WWDC24
www.zdnet.com
Ransomware: An executive guide to one of the biggest menaces on the web Everything you need to know about ransomware: how it started, why it's booming, how to protect against it, and what to do if your PC is infected. Read now The company is currently planning a multi-day maintenance window to deal with the attack's aftermath, which includes shutting down its official website, the Garmin Connect u
"If building Rustic interfaces within the kernel requires some additional language features, we should see what enhancements to the language would best serve those requirements," he said in a mailing list discussion about a proposed Linux Plumbers Conference session on support for Rust in the Linux kernel tree. SEE: Hiring Kit: Python developer (TechRepublic Premium) "I've often seen the sentiment
Securing Your Mobile Enterprise Mobile devices continue their march toward becoming powerful productivity machines. But they are also major security risks if they aren't managed properly. We look at the latest wisdom and best practices for securing the mobile workforce. Read now The Indian government has banned today 59 Chinese mobile applications on the grounds of national security, according to
Apple declined to implement 16 Web APIs in Safari due to privacy concerns Apple said these 16 new Web APIs add new user fingerprinting opportunities for online advertisers. Apple said this week that it declined to implement 16 new web technologies (Web APIs) in Safari because they posed a threat to user privacy by opening new avenues for user fingerprinting. Technologies that Apple declined to inc
Microsoft's GitHub: Now open-source developers get 'one linter to rule them all' GitHub says it's open-sourcing its in-house linting tool, the GitHub Super Linter, to clean up code. Having a tool that checks source code for programming blunders and other errors is useful for developers. Now Microsoft-owned GitHub has released the 'Super Linter' to help developers avoid the hassles of setting up co
How the top VPNs compare: Plus, should you try a free VPN? We tested the best VPN services -- focusing on the number of servers, ability to unlock streaming services, and more -- to determine a No. 1 overall. Plus, we tell you whether free VPNs are worth trying. Read now Amazon said its AWS Shield service mitigated the largest DDoS attack ever recorded, stopping a 2.3 Tbps attack in mid-February t
The code-hosting portal is just the latest in a long line of tech companies and open source projects that have expressed support for removing terms that may be offensive to developers in the black community. This includes dropping terms like "master" and "slave" for alternatives like "main/default/primary" and "secondary;" but also terms like "blacklist" and "whitelist" for "allow list" and "deny/
In a terrible year, it was a great moment. On May 30, SpaceX's Crew Dragon, the first private-manned spacecraft ever and the first US-manned spaceflight in nine years, successfully delivered NASA astronauts Bob Behnken and Doug Hurley into orbit. Taking them was SpaceX's reusable Falcon 9, powered by rocket fuel and Linux. Like supercomputers, Internet of Things (IoT) devices, and many mission-cri
AWS engineer Pawel Wieczorkiewicz discovered a way to leak data from an Intel CPU's memory via its L1D cache, which sits in CPU cores, through 'bus snooping' – the cache-updating operation that happens when data is modified in L1D. SEE: Cybersecurity: Let's get tactical (free PDF) In the wake of the disclosure, AWS engineer Balbir Singh proposed a patch for the Linux kernel for applications to be
Why you can trust ZDNET : ZDNET independently tests and researches products to bring you our best recommendations and advice. When you buy through our links, we may earn a commission. Our process ZDNET's recommendations are based on many hours of testing, research, and comparison shopping. We gather data from the best available sources, including vendor and retailer listings as well as other relev
The agreement was finalized Sunday and the parties will be in power until 2026. "We will adhere to the principle of 'public money, public code'. That means that as long as there is no confidential or personal data involved, the source code of the city's software will also be made public," the agreement states. SEE: 20 quick tips to make Linux networking easier (free PDF) The decision is being hail
Huawei denied on Monday having any official involvement in an insecure patch submitted to the Linux kernel project over the weekend; patch that introduced a "trivially exploitable" vulnerability. The buggy patch was submitted to the official Linux kernel project via its mailing list on Sunday. Named HKSP (Huawei Kernel Self Protection), the patch allegedly introduced a series of security-hardening
Ghost blogging platform servers hacked and infected with crypto-miner Ghost platform got hacked via the same vulnerability that allowed hackers to breach LineageOS servers hours before. Image: GhostA serious hacking campaign is currently underway, and tens of companies have been hacked already, ZDNet has learned from security researchers keeping an eye on the attacks. For the past 24 hours, hacker
The future of business is remote Most every organization has been thrust into the future of work. What will determine failure or success in this brave new world? Read now The US National Security Agency (NSA) published last week a security assessment of today's most popular video conferencing, text chatting, and collaboration tools. Also: Best video conferencing software and services in 2020 The g
DeisLabs, an Azure incubator for creating Kubernetes tools, has also used Rust to build Krustlet, a 'kubelet' than lets developers run multiple WebAssembly modules (Wasm) in Kubernetes, the dominant open-source tool for managing Docker containers. SEE: Six in-demand programming languages: Getting started (free PDF) Kubernetes was created by Google and written mostly in Google's Go programming lang
An update to a tiny JavaScript library has thrown a large part of the JavaScript ecosystem into chaos on Saturday, with millions of projects believed to have been impacted. Making the entire situation ridiculously absurd is that the whole mess was caused by a "one-liner" JavaScript library, marking this the second time when a tiny JavaScript project has caused widespread issues. The is-promise one
Cloud computing: This is how much you'll be spending on it next year Cloud spending rises again as companies rely on outside providers for apps and security. Read now For the past few months, a malware operation has been scanning the internet for Docker servers running API ports exposed on the internet without a password. Hackers are then breaking into unprotected hosts and installing a new crypto
Marriott discloses new data breach impacting 5.2 million hotel guests Image: Michal Mrozek on UnsplashHotel chain Marriott disclosed today a security breach that impacted more than 5.2 million hotel guests who used the company's loyalty app. According to a breach notification posted on its website, the hotel chain learned of the security breach at the end of February, when it discovered that a hac
Special report: A winning strategy for cybersecurity (free PDF) This ebook, based on the latest ZDNet/TechRepublic special feature, offers a detailed look at how to build risk management policies to protect your critical digital assets. Read now Hackers are exploiting a zero-day vulnerability in the Windows 7 OS to take over systems, Microsoft said in a security alert today. The zero-day is locate
Details about a new "wormable" vulnerability in the Microsoft Server Message Block (SMB) protocol have accidentally leaked online today during the preamble to Microsoft's regular Patch Tuesday update cycle. No technical details have been published, but short summaries describing the bug have been posted on the websites of two cyber-security firms, Cisco Talos and Fortinet. The security flaw, track
Security researchers say that an Android malware strain can now extract and steal one-time passcodes (OTP) generated through Google Authenticator, a mobile app that's used as a two-factor authentication (2FA) layer for many online accounts. Google launched the Authenticator mobile app in 2010. The app works by generating six to eight-digits-long unique codes that users must enter in login forms wh
Today, at the RSA 2020 security conference in San Francisco, security researchers from Slovak antivirus company ESET will present details about a new vulnerability that impacts WiFi communications. Named Kr00k, this bug can be exploited by an attacker to intercept and decrypt some type of WiFi network traffic (relying on WPA2 connections). According to ESET, Kr00k affects all WiFi-capable devices
Google to Samsung: Stop messing with Linux kernel code. It's hurting Android security Google Project Zero scolds Samsung and other vendors for adding features that undermine Android security. Samsung's attempt to prevent attacks on Galaxy phones by modifying kernel code ended up exposing it to more security bugs, according to Google Project Zero (GPZ). Not only are smartphone makers like Samsung c
Python programming language: Now you can take NSA's free course for beginners NSA releases Python course after receiving a Freedom of Information Act (FOIA) request for its training materials. Developers already have numerous options from the likes of Microsoft and Google for learning how to code in the popular Python programming language. But now budding Python developers can read up on the Natio
Cyberwar and the Future of Cybersecurity Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly. Read now In a statement published today, Twitter disclosed a security incident during which third-parties exploited the company's official API (Application Programming Interfac
Hacker leaks passwords for more than 500,000 servers, routers, and IoT devices A hacker has published this week a massive list of Telnet credentials for more than 515,000 servers, home routers, and IoT (Internet of Things) "smart" devices. The list, which was published on a popular hacking forum, includes each device's IP address, along with a username and password for the Telnet service, a remote
The security team at npm (Node Package Manager), the de-facto package manager for the JavaScript ecosystem, has taken down today a malicious package that was caught stealing sensitive information from UNIX systems. The malicious package is named 1337qq-js and was uploaded on the npm repository on December 30, 2019. The package was downloaded at least 32 times, before it was spotted and today by Mi
Google has announced plans today to phase out the usage of user-agent strings in its web browser Chrome. For readers unfamiliar with the term, user-agent (UA) strings are an important part of the modern web and how browsers function. A UA string is a piece of text that browsers send to websites when they initiate a connection. The UA string contains details about the browser type, rendering engine
Azure founders reflect on Microsoft's first decade as a public cloud vendor Microsoft's Yousef Khalidi and Hoi Vo, key members of the original Azure 'dream team,' look back on the ups, downs and lessons learned since Microsoft began working on its Azure public cloud. Microsoft's Azure operating system, codenamed "Red Dog," was designed by a team of Microsoft OS experts including Dave Cutler, the f
次のページ
このページを最初にブックマークしてみませんか?
『ZDNet News- Page One』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く