Cybercriminals are having their way with companies and users, with distributed denial of service (DDoS) attacks growing in size - and sophistication - during Q3, according to reports. DDoS attacks 10 Mbps or above ramped up 38 percent from Q2 to Q3, according to the Verisign Distributed Denial of Service Trends Q3 2014 report, with the media and entertainment verticals most targeted.
Average attack size declined from Q2 to Q3, but that was because of an overwhelming number of attacks launched during the second quarter, the report states. "Rather than using volumetric attacks to overwhelm servers, organizations should be wary of cyberattackers targeting crucial ports to thwart legitimate traffic from reaching online destinations," according to the report.
Looking ahead to 2015, cybersecurity experts will certainly have their hands full, trying to defend against DDoS, malware, and advanced persistent threats (APTs) - as companies struggle to improve their network security.
LG's CEO has just stepped down, with Dr. Jong-Seok Park citing health problems as to why he's stepping down from the company. He will be replaced by Juno Cho from LG's holding company.
With the company posting record high sales, and increased profits, a change of leadership could continue this into the future. The G3 is doing well, and the company seems to be capitalizing on it, which is good to see.
Telltale Games' upcoming Game of Thrones game is nearly here, with the first episode arriving on December 2 for PC, Mac, and the PS4. The next day, on December 3, it will arrive for the Xbox One and Xbox 360, while on December 4 it will arrive on iOS. PlayStation 3 owners will have to wait until December 9.
The game itself takes place toward the end of season three in the HBO show, and before the start of season five. Gamers will be propelled into House Forrester, a noble house from the Wolfswood in the north of Westeros. Players will be able to play through five different perspectives in the game, from servants to House members.
Some of the talent from the show are coming back to reprise their roles for Telltale's game, including Tyrion Lannister performed by Peter Dinklage, Cersei Lannister performed by Lena Headey, Margaery Tyrell performed by Natalie Dormer, and Ramsay Snow performed by Iwan Rheon.
Star Citizen is edging close to $64 million in crowdfunding, with the CryEngine-powered title sitting at just under $63.5 million at the time of writing. Roberts Space Industries has now announced that there will be a pet system introduced once the game hits $64 million.
RSI explains it as: "Pets - We have repair bots, we have fish... but we haven't implemented a traditional pet system in Star Citizen yet. At $64 million, that changes. From Jones the Cat in Alien to the Battlestar Galactica's Daggit, pets have a place onboard starships... and we want to give you that option in Star Citizen. Expect traditional terrestrial options, plus anything exotic we can dream up in the Star Citizen universe! (Those Torshu Grey crabs that keep escaping are just the start.) This stretch goal is in honor of Paddington, Strike Dog of the UEES Paul Steed. In one of our first videos Paddington helped us get to $4 million back in the initial campaign, and sadly passed away recently".
President Obama has just signed the E-Label act into law today, which will see the logos on the back of our smartphones not required in the future.
The labels will be replaced by software on the device itself, with the device that will benefit the most being the iPhone, which has logos splashed along the bottom of it. The E-Label law passed through the House unanimously, and then again through the Senate without an issue. Manufacturers can now remove the logos, which will also save them money.
The FBI stepped over its boundaries with this particular case, where the US agency wanted to gain entry into a particular hotel guest's room, all without a warrant. When they couldn't secure one, they did the next best thing: posed as Internet technicians, gaining access to the hotel room, all without a warrant.
From the motion to suppress, we find out: "The next time you call for assistance because the internet service in your home is not working, the "technician" who comes to your door may actually be an undercover government agent. He will have secretly disconnected the service, knowing that you will naturally call for help and -- when he shows up at your door, impersonating a technician -- let him in. He will walk through each room of your house, claiming to diagnose the problem. Actually, he will be videotaping everything (and everyone) inside. He will have no reason to suspect you have broken the law, much less probable cause to obtain a search warrant. But that makes no difference, because by letting him in, you will have "consented" to an intrusive search of your home".
The FBI agents secured evidence from the hotel room, and submitted it to a magistrate to get a warrant. Kind of the reverse of what should happen, but they obviously wouldn't have told the judge that they posed as the Internet technicians in order to get into the room to secure the evidence they required to obtain the warrant in the first place.
The Syrian Electronic Army hacking group have recently attacked the commenting platform Gigya, implementing popups in popular news websites such as The Independent - starting as of early this morning.
The affected websites include large-names such as The Telegraph, CNBC, PC World and The Chicago Tribune. According to Patrick Salyer, Gigya's chief executive, these hackers were able to alter the 'whois' domain registration record for Gigya.
Company executives should be concerned - and prepared - if their company ends up getting hit by a successful cyberattack, possibly leading to a data breach. However, a general misconception that the IT staff is proactive and ready to defend against cyberattacks often is not the case, especially with overworked IT teams unable to keep up.
Although there are steps to make a data breach preventable, they certainly aren't fool-proof - and every company should have plans in place if a breach occurs.
It's also worth noting that cybercrime is done for a number of reasons, and it's not just about stealing personal information, such as debit and credit card data. Although that appears to be the basis of the Target, Home Depot and other retailer breaches, there is a growing worry of cyberespionage targeting companies and their host nation.
Apple has released another ad for its iPhone 6, highlighting its Voice Text feature on iOS 8. Voice Text for iOS 8 will instantly send audio messages through iMessage, in the same way Facebook Messenger does.
The ad points out that it is sometimes easier to send a quick voice message than it is to type it, especially when there are longer, more complicated words to use. You could even sing to someone, which is something that is next to impossible to do over text messages.
Nintendo have just had a patent go public in the United States Patent and Trademark Office (USPTO) that has been discovered by a NeoGAF named "Rösti".
This patent refers to Gameboy emulation being allowed on other hardware - including mobile phones. This patent also covers emulation on in-flight entertainment models for aircraft, trains and PDA devices.
I have seen Gameboy Advance Emulator's around since the mid-2000s, with one of the most popular between my friends being Visual Boy Advance. However, these aren't only illegal, but do not draw any profit for Nintendo themselves as they are downloaded off various internet sites dedicated to the cause. Alongside computer emulation programs, emulators have seen light on PDA's in the mid-2000s such as the Palm Treo.