Continuing our round up of 2013 IT security vendor predictions, we've got the thoughts of three of the big Infosecurity Europe exhibitors: Palo Alto Networks, SafeNet and Kaspersky Lab. ![dweb-infoseceurope](/attachments/small/0/dweb-infoseceurope.jpg "align-right") Brian Tokuyoshi from Palo Alto Networks predicts that social media, data decryption and virtualised network security will be high on the agenda in the year to come. "Increasingly, social media platforms and webmail are becoming de facto communication platforms for personal use, bypassing enterprise security products in the process. Encryption makes more of this traffic invisible to existing security controls. In 2013, enterprises need to find ways to make …

Member Avatar
Member Avatar
+0 forum 2

The question of what actually triggers a 7-result SERP is definitely complicated, especially as Google expands into Knowledge Graph and advanced forms of entity association. There's definitely no simple on-page SEO trick to get the 7-result SERP

Member Avatar
Member Avatar
+0 forum 6

Continuing with our round up of the IT security vendor view of the year to come, here's how PandaLabs, the malware research laboratory arm of [Panda Security](http://www.pandasecurity.com/), sees 2013 stacking up in terms of threats and exploits. ![panda](/attachments/small/0/panda.jpg "align-right") Perhaps unsurprisingly, PandaLabs predicts that 2013 will be much the same as 2012 in that software vulnerabilities will take centre stage and be the main target of cyber-criminals. It is "undoubtedly the preferred method of infection for compromising systems transparently, used by both cyber-criminals and intelligence agencies in countries around the world" according to PandaLabs technical director Luis Corrons. This year …

Member Avatar
Member Avatar
+0 forum 1

Network security vendor [Stonesoft](http://www.stonesoft.com/en/) predicts that the top infosec threats to watch out for in 2013 will include unseen and unknown targeted cyber-attacks, espionage and hacktivism. Jarno Limnell, director of cyber-security at Stonesoft, reckons that in 2013 the security of the digital world will become an even more pressing issue, and this will lead to increasing pressure to consider international norms, rules and regulations. "As nation-states continue to invest heavily in cyber capabilities (defence and offence), it is also likely that they will be more inclined to use these capabilities and the use of cyber force in the world will …

Member Avatar
Member Avatar
+2 forum 1

Hi there, I am studying software engineering on my 3rd year and from time to time I think about the job I am gonna do during rest of my life.As a result I look at the trends of todays IT and application development world. There is a significant shift from system programming to desktop, web and mobile application development in recent decades. The reason is simple, it is commerialy more beneficial as it finds a quick application in todays industry. As a result it is popular and easier to grasp to non expert programmers. Here i might be wrong, cause …

Member Avatar
Member Avatar
+0 forum 13

As the Marketing trends and tactics are changed with the passage of time and the Main Medium of communication with groups and individual has become Mobile Phone and people care about its updates like text messages so the Advertising Agency discovered Mobile Marketing as the most instant and simplest way to advertise the any specific content and the way millions of potential users are waiting this service as almost 95% read text messages within 15 mins so the new applications developed in the mobiles that integrated with the social media enlarged the playing field of advertisers. I would to see …

Member Avatar
Member Avatar
+0 forum 3

Who wants some forged educational documents that will help you get a job in some foreign country? The answer, it would seem, is lots and lots of people. At least that would explain why spam advertising fake diplomas has topped the list of junk mail subject matter for China, South Korea and Vietnam according to the latest McAfee [URL="http://www.mcafee.com/us/threat_center/white_paper.html"]Internet Threat Report[/URL] which was published today. The report, covering the threat landscape for the first quarter of 2010, also reveals that while email subjects vary greatly from country to country, diploma spam coming out of China and other Asian countries is …

Member Avatar
Member Avatar
+0 forum 2

I read this very interesting blog about how Social Media Comprises 20% of All US Display Ad Impressions as per Comscore data. [url]http://blog.searchenginewatch.com/090901-125314[/url] So I predict this will increase in due time.

Member Avatar
Member Avatar
+0 forum 4

Ok I have been looking for this for a while it is the ultimate list of repositories for the Ubuntu 6.06 Dapper Drake distro. It will give you so many program choices you wont know what to do. simply goto your terminal and type sudo gedit /etc/apt/sources.list (I chose gedit for this because im assuming it is the easiest for people try kate for kde, also nano,vi, and emacs should work) and then add this to the file # Treviño’s Ubuntu Dapper Sources list # http://italy.copybase.ch/blog/?page_id=13 # # Based on source-o-matic (http://www.ubuntulinux.nl/source-o-matic) list # Added extra repository # # If …

Member Avatar
Member Avatar
+0 forum 3

Usually quarterly spam trend reports from security vendors are, how can I put this nicely, actually I can't so I will just have to say it as it is: bloody boring and mostly pointless. However, the latest such report to fins its way into my mailbox from [URL="http://www.sophos.com/blogs/gc/"]Sophos[/URL] caught my attention because right from the get go it went on the attack, and the target was none other than US President Barack Obama. Now just the what the heck Obama has got to do with spam, other being one of the names that crops up in [URL="http://www.daniweb.com/blogs/entry3461.html"]spam subject fields[/URL] to …

Member Avatar
+0 forum 0

The Google Press office today brought to my attention an unusual and totally unexpected bit of Google trivia: the modelling of real-world phenomena using patterns in search to [URL="http://www.google.org/flutrends"]map the spread of influenza[/URL] across the US. Google is proving to be far more than just a search engine these days. In fact, today it repositioned itself as a [URL="http://www.itwire.com/content/view/21652/53/"]time travel machine[/URL] which allows users of Google Earth to travel back to 320 AD and explore more than 6700 buildings as they stood at the centre of the Roman Empire back then. The biggest collection of 3D buildings on the Google …

Member Avatar
+0 forum 0

The [URL="http://www.messagelabs.com/intelligence.aspx"]MessageLabs Intelligence Report[/URL] for May 2008 has revealed that spam levels have risen across all industry sectors, but manufacturing remains the leading vertical as far as spam activity is concerned at 83.7 percent. The biggest rise, however, can be found in the non-profit sector with spam levels up by 7 percent to 81.3 percent. The retail sector sits at 80 percent, the public sector 75.7 percent and finance 71.7 percent. The finance sector also saw 1 in every 248.2 emails containing some kind of virus activity, although that is way behind the 1 in 43.8 infected emails that can …

Member Avatar
+0 forum 0

That is what we could be asking by 2012, and be answered with a resounding cry of to the job centre looking for new employment if Fujitsu Siemens Computers is correct with its prediction. FSC today suggested that within just four years unmanned data centres will not only be fully commercially operational but will also outnumber the manned data centres that we have at the moment. It also warned that this will have a profound skills impact upon the IT sector, leading to a potential skills surplus in IT across the UK and Europe. Sure, these ‘lights out’ data centres …

Member Avatar
Member Avatar
+0 forum 2

Matthew Finnie is Chief Technology Officer at [URL="http://www.interoute.com/"]Interoute[/URL], the company which owns and operates the most densely connected voice and data network in Europe with more than 54,000 kilometres of lit fibre. So when he voices his concern that the Internet is facing some kind of meltdown, caused by the sheer scale of data being carried across it, and mentions a countdown to this brownout explosion that hits ground zero in 2010, you have to pay attention. When he adds that much of the problem is being driven by a reluctance on the part of many operators to actually invest …

Member Avatar
+0 forum 0

The University of Miami in the US has got together with the University of Dundee in Scotland to work with IBM on a project to develop open source software designed specifically to address the needs of older people, and help them to adapt to and remain productive in the 21st century workplace. While I can certainly see that workforces in many developed countries are aging, and at the same time the pool of available younger workers is often shrinking fast, I am not convinced that the answer to lost skills and knowledge as this older workforce retires sits with software, …

Member Avatar
+0 forum 0

In the UK last year there were a staggering 3,237,500 cybercrimes committed according to a new [URL="https://www.garlik.com/index1.php?page=cybercrime"]report[/URL] from online identity specialists [URL="http://www.garlik.com"]Garlik[/URL] in collaboration with leading criminologists. Do the math and that works out to one cybercrime committed every ten seconds in the UK alone. Of these, some 60 percent were what are termed offences against the person such as threatening emails, libellous website comments and Internet perpetrated blackmail attempts. There were more than 200,000 cases of online financial fraud, double the number of real-world robberies that took place in the UK during the same period. ID theft online hit …

Member Avatar
Member Avatar
+0 forum 2

It was only a matter of time, but the long arm of the British law has finally reached out to embrace the BlackBerry. 500 front line police officers in Bedfordshire, England have already been issued with BlackBerry devices to enable them to spend more time tackling crime and less time being chained to the desk at the police station. Another 500 are due to be equipped by early next year. The BlackBerry handsets give the British Bobbies direct access to all relevant back-end systems such as the Police National Computer and the Police National Legal Database, as well as the …

Member Avatar
+0 forum 0

For those who may not have heard, former network leader Novell (who owns SuSE Linux) made a deal with Microsoft exchanging some intellectual property rights. Those in the business-end of IT know that Microsoft is busy applying for thousands of patents concerning Intellectual Property -- have a look at Network Computing and Information Week for all the good details. From Groklaw: Under the Patent Cooperation Agreement, Microsoft commits to a covenant not to assert its patents against Novell's end-user customers for their use of Novell products and services for which Novell receives revenue directly or indirectly from such customers, with …

Member Avatar
Member Avatar
+0 forum 1

The 2006 Virus Bulletin Conference is currently taking place in Montreal, and some interesting trends are emerging from the various security vendors speaking at the event. Trends such as the way that the widely distributed attack using worms, viruses and Trojans are increasingly becoming a decreasing concern. At least once you move outside of the strictly consumer realm. For the corporate user it is the highly targeted, tightly focused, small scale Trojan attack that is causing the biggest headache. Note that what we are talking about here is concern, not risk. The widely distributed, multi-million spam delivered malware threat has …

Member Avatar
+0 forum 0

What Caused Microsoft to Create DirectX10? It all started with the Windows Error Reporting Tool. Microsoft was collecting hundreds of Bugs per day only for its Operating System. Microsft Found out that 70% of all errors and bad user Experience in Windows XP comes from Graphic Display drivers. First, Microsft saw that most of the Drivers used are not certified (WHQL). Secondly, Microsoft also saw that due to the fact that the Graphic Driver runs in Kernel Mode, if it crashes, it brings the entire Operating System Down. So Microsoft said: “Heck! If we solve the only problem that is …

Member Avatar
Member Avatar
+0 forum 1

Intel officially announced the introduction of 10 Core 2 Duo and Core Extreme microprocessors for desktops, workstations and notebooks. Intel said it has over 550 customer system designs underway, with the CPUs built on 65 nanometre technology. Machines using the desktop chips will be available in early August, while notebooks will become available at the end of that month. Five of the family are aimed for desktops, five for notebook and mobile users. The products were formally codenamed "Cointreau" and "Merom". The chips support 64-32 instructions, so called smart cache which shares L2 cache, wide dynamic execution, and instructions that …

Member Avatar
+0 forum 0

After months of possible merger information it finally happens and I am surprised at the amount of money that AMD had to spend on this. This is a huge step for both companies. Currently Intel is the lead manufacturer of microprocessors, semiconductors, and graphics chips with AMD being the second for microprocessors and Nvidia and Ati battling it out for second in the graphics chips. Now of course Intel graphics chips are like integrated graphics obviously if you need a high end graphics card you would go with a Nvidia, Ati, or some of the other card manufacturers. The only …

Member Avatar
+0 forum 0

The world of malware could be turned upon its head if the Blue Pill virtualization based rootkit due to be demonstrated at the [URL="http://syscan.org"]SyScan 06[/URL] Conference, Singapore, in a couple of weeks proves as undetectable as the security researcher who has created it claims. [URL="http://invisiblethings.org/"]Joanna Rutkowska[/URL] is a stealth malware researcher with a Singapore based IT security business, and specializes in rootkit technology. Using AMD's SVM/Pacifica virtualization technology, she has created a working prototype that not only takes complete control of the underlying operating system but also remains 100% undetectable while doing so. The demonstration will be on the Vista …

Member Avatar
+0 forum 0

I was recently working on a personal project to setup a PVR system for my living room. The first part of this project was relatively easy; I just bought another dell computer. The next step was a little bit complicated, see, personally I would typically like to use an OS that has a portage type system (Gentoo, FreeBSD, etc.), but I felt that I needed a little work on my [url="http://www.rpm.org/"]RedHat Package Management[/url] skills. This required that I use RedHat Enterprise 3 or 4, since the [url="http://fedora.redhat.com/"]Fedora[/url] code uses [url="http://linux.duke.edu/projects/yum/"]Yum[/url] (which I ended up installing anyway). When I first installed …

Member Avatar
Member Avatar
+0 forum 1

At [URL="http://www.supercomp.de/"]ISC2006[/URL], the 21st International Supercomputer Conference, in Dresden, Germany today an interesting announcement was made by [URL="http://www.tyan.com"]Tyan Computer[/URL]: the launch of the Personal Supercomputer. Not quite a desktop machine, it is being marketed as a deskside unit, the [URL="http://www.tyan.com/products/html/clusterservers.html"]Typhoon PSC[/URL] certainly promises to pack quite a punch. The 8 processors and 64Gb RAM delivering a hard hitting maximum 70 Gigaflop punch to be precise. All this in a device no bigger than a couple of standard desktop PCs and bringing low noise and power consumption to what we normally think of as the noisy, high power end of the …

Member Avatar
Member Avatar
+0 forum 6

According to just released research from Michigan based [URL="http://www.onlymyemail.com"]OnlyMyEmail [/URL]Inc it would appear that Sender ID is ineffective as an anti-spam solution. Despite the high profile, and frankly somewhat aggressive PR campaign by [URL="http://www.microsoft.com/mscorp/safety/technologies/senderid/default.mspx"]Microsoft[/URL], the 60 day statistical analysis certainly suggests that it isn’t the Holy Grail of anti-spam that Mr. Gates would have us believe. Across a 60 day period, OnlyMyEmail discovered that emails sent by a domain without a published [URL="http://en.wikipedia.org/wiki/Sender_Policy_Framework"]Sender Policy Framework[/URL] (SPF) record were only slightly less likely to be spam than those sent by domains that publish Sender ID information in their DNS records. But, …

Member Avatar
Member Avatar
+0 forum 1

The reports that are popping up all over the web that [URL="http://www.ibm.com"]IBM[/URL], along with [URL="http://www.gatech.edu"]Georgia Tech[/URL], has [URL="http://www.gatech.edu/news-room/release.php?id=1019"]demonstrated [/URL]the world’s fastest ever chip are, sadly, not quite as exciting as you might at first think. Not least because this wasn’t a chip at all, but rather a transistor, and even the least technical minded of people will realize there’s something of a difference between the two. Looking beyond that basic misunderstanding of the facts, the news still fails to excite me as much as it seems to have excited everyone else and here’s for why: Yes, it did run at …

Member Avatar
Member Avatar
+0 forum 2

The triple-gate transistor is not new, almost exactly three years ago on June 12th 2003 at the [URL="http://www.intel.com/pressroom/archive/releases/20030612tech.htm"]Symposia of VLSI Technology and Circuits in Kyoto[/URL], Japan, [URL="http://www.intel.com"]Intel [/URL]was heralding it as the future of chip design. However, the fact that at the same [URL="http://www.vlsisymposium.org/index.html"]Symposium this week in Hawaii[/URL], Intel reveals the technology is moving out of the conceptual research phase and could be used in chip production as soon as 2010 most certainly is newsworthy. Intel has successfully built the transistors which use gates on three sides to control current: a structure that reduces leakage (so less overheating and less …

Member Avatar
+0 forum 0

Multiple core processors are set to dominate the marketplace by the end of 2007, after [URL="http://www.amd.com"]AMD [/URL]follows [URL="http://www.intel.com"]Intel [/URL]down the ‘more performance for less power’ road. Having already beaten Intel to the dual-core processor punch, the announcement from AMD that it will ship four-core processors for high end desktops, servers and workstations by mid-2007 puts the chip giants back head-to-head once again. Considering the market share that AMD has carved out for itself in such a relatively short time, currently standing at 20%, Intel look a little exposed right now. It was hoping to stall the market slippage with the …

Member Avatar
+0 forum 0

In 2002, IBM scientists managed to produce a magnetic data tape capable of a storage density of 1 billion bits per square inch. This week the [URL="http://www.almaden.ibm.com"]IBM Almaden Research Center [/URL]boffins have done it again, in conjunction with Fuji, to the tune of 6.67 billion bits per square inch. That figure I confidently expected to rise to 8 billion by the time the tape becomes commercially available in 2011. If you are not a large corporate then this news will probably hold little more than a passing geek interest. For the enterprise that requires large volumes of static data storage …

Member Avatar
+0 forum 0

The End.