Researchers at the University of Texas in Dallas have designed an imager chip that could turn mobile phones into devices that can see through walls, wood, plastics, paper and other objects. The team's research linked two scientific advances. One involves tapping into an unused range in the electromagnetic spectrum. The other is a new microchip technology. Read more here -... Read More
Auditing or assessing risks related to cloud setups may seem daunting at first, especially if an IT audit and assurance professional may lack cloud computing experience. A fine book published by ISACA & ITGI can give you the necessary heads up to initiate an assurance process. It is an excellent starting point but remember that it has to be modified... Read More
According to Peter G. Neumann, an 80-year-old computer scientist at SRI International, the increasing complexity of modern hardware and software has made it virtually impossible to identify the flaws and vulnerabilities in computer systems and ensure that they are secure. Peter's intuition is that complexity has become something that people don't want to hear about and the inclination is now... Read More
Is Facebook aiming at something bigger with its new data center? Rather than commissioning the buildup of its data center, Facebook went for a complete new model, which they call the Open Compute Project. The technology behind Facebook's green data center is developed together with major hardware vendors such as HP, Dell, AMD and Intel which shows that Facebook has... Read More
Although, it's a recommended best practice to test and debug malware in an isolated and contained environment, this post by Marco Ramilli explains how crafty malware can eventually detect this environment and behave in a different way. Malware can detect virtualized environments, active debuggers and sandbox environments. Briefly, malware authors can easily insert code into their software that detects such... Read More
Extract taken from September's MSExchange.org newsletter authored by Henrik Walther, MCM: Exchange Okay so there's quite a few of you that would like to test a migration from an on-premise Exchange environment to Office 365 in order to get some hands on experience prior to doing this as an administrator within your enterprise organization or maybe as a partner consultant... Read More
According to Nick Hopkinson, the former head of GCHG and CESG, UK is lagging behind the US, Germany and France in its ability to respond to cyber-attacks. This is due to a "lack of cohesion" between the various organizations set up to work towards the national cyber security strategy. But according to UK's Cabinet Office one year after the Strategy... Read More