Nikita
Username: Nikita
Bio: The price of liberty is constant vigilance.
City: London
Country: United Kingdom
Evasium
atom rss
4

Cyberwar predictions for 2019: the stakes have been raised

Cyberwar predictions for 2019: the stakes have been raised
Nikita Nikita 7 hours, 28 minutes ago
Cybersecurity will define many of the international conflicts of the future. Here's an overview of the current threat landscape, UK and US policy in this area, and some expert predictions for the comi
More details>>
Read on www.zdnet.com
Tags: Safety, zdnet
6

Cyberwar and the future of cybersecurity (free pdf download)

Cyberwar and the future of cybersecurity (free pdf download)
Nikita Nikita 11 hours, 12 minutes ago
This special report from ZDNet and TechRepublic takes an in-depth look at today's security threats and provides advice to defend against attacks.
More details>>
Read on www.zdnet.com
Tags: Safety, zdnet
14

Reverse decorator in vb.net (winforms)

Reverse decorator in vb.net (winforms)
DotNetBoy DotNetBoy 13 hours, 41 minutes ago
Introduction This article is a continuation of my last article, Decorator Pattern in VB.NET Winforms. I love using that pattern for all the reasons given in the article, but I ran up against a wall whenever I would try to do anything with multi-threadi...
More details>>
Read on www.codeproject.com
Tags: Dev, codeproject
11

First annual cyberwarcon

First annual cyberwarcon
Dext Dext 15 hours, 13 minutes ago
Events By Kurt Baumgartner on Cyberwarcon is a brand new event organized yesterday in Arlington, Virginia, and delivered eight hours of fantastic content. “CyberwarCon is a one-day conference in the Washington D.C. area focused on the specter o...
More details>>
Read on securelist.com
Tags: Safety, securelist
19

Marriott breach: starwood's hacker tier rewards millions of customer records

Marriott breach: starwood's hacker tier rewards millions of customer records
Dext Dext 16 hours, 7 minutes ago
Sure, this breach happened to Starwood, not Marriott. But the biggest brand always gets bloodied in a breach. Forrester's Jeff Pollard and Enza Iannopollo discuss the impacts on GDPR, brand image, and
More details>>
Read on www.zdnet.com
Tags: Safety, zdnet
16

Critical zoom flaw lets hackers hijack conference meetings

Critical zoom flaw lets hackers hijack conference meetings
Trident Trident 16 hours, 46 minutes ago
NewsletterSubscribe to our Threatpost Today newsletter Join thousands of people who receive the latest breaking cybersecurity news every day. The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detaile...
More details>>
Read on threatpost.com
Tags: Safety, threatpost
21

Python in visual studio code – november 2018 release

Python in visual studio code – november 2018 release
DotNetBoy DotNetBoy 17 hours, 9 minutes ago
|Search MSDNSearch all blogsSearch this blogSign in Using Python to drive innovation★★★★★★★★★★★★★★★Dan Taylor MSFT0Share00 We are pleased to announce that the November 2018 release of the Python Extension for Visual Studio Code is now available. You...
More details>>
Read on blogs.msdn.microsoft.com
Tags: Dev, sxp
24

Announcing typescript 3.2

Announcing typescript 3.2
Vishal Vishal 17 hours, 37 minutes ago
★★★★★★★★★★★★★★★Daniel Rosenwasser//6 CommentsShare00 TypeScript 3.2 is here today! If you’re unfamiliar with TypeScript, it’s a language that brings static type-checking to JavaScript so that you can catch issues before you even run your code – or be...
More details>>
Read on blogs.msdn.microsoft.com
Tags: Dev, sxp
24

Aclu wants court to release documents on the us' attempt at backdooring facebook messenger

Aclu wants court to release documents on the us' attempt at backdooring facebook messenger
Dext Dext 18 hours, 29 minutes ago
While the FBI-vs-Apple battle played out in the public, the FBI-vs-Facebook encryption backdoor war remained a secret for months.
More details>>
Read on www.zdnet.com
Tags: Safety, zdnet
23

Threatlist: cryptominers dominate malware growth in 2018

Threatlist: cryptominers dominate malware growth in 2018
Nikita Nikita 1 day, 20 hours ago
NewsletterSubscribe to our Threatpost Today newsletter Join thousands of people who receive the latest breaking cybersecurity news every day. The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detaile...
More details>>
Read on threatpost.com
Tags: Safety, threatpost
24

Yasoob khalid: email security & privacy

Yasoob khalid: email security & privacy
Vishal Vishal 1 day, 21 hours ago
Hi everyone! I hope all of you are doing well. Things have been super exciting on my side. Just got done with a file system checker project in C for my Operating Systems class. It was mentally draining but equally rewarding. This blog post is not about ...
More details>>
Read on pythontips.com
Tags: Dev, planetpython
24

Disorganized crime and state-backed hackers: how the cybercrime and cyberwar landscape is constantly changing

Disorganized crime and state-backed hackers: how the cybercrime and cyberwar landscape is constantly changing
Nikita Nikita 1 day, 22 hours ago
Steve Ranger discusses how criminal groups and state-backed hackers work together to make money and cause significant trouble.
More details>>
Read on www.zdnet.com
Tags: Safety, zdnet
23

Tariffs on chinese rare-earth minerals create a sticky problem for us competitors

Tariffs on chinese rare-earth minerals create a sticky problem for us competitors
Llyods Llyods 1 day, 22 hours ago
Skip to main contentBiz & ITTechSciencePolicyCarsGaming & CultureStoreForumsSubscribeClose Navigate StoreSubscribeVideosFeaturesReviewsRSS FeedsMobile SiteAbout ArsStaff DirectoryContact UsAdvertise with ArsReprints Filter by topic Biz & ITT...
More details>>
Read on arstechnica.com
Tags: arstechnica, Studies
24

What the marriott breach says about security

What the marriott breach says about security
Dext Dext 1 day, 23 hours ago
We don’t yet know the root cause(s) that forced Marriott this week to disclose a four-year-long breach involving the personal and financial information of 500 million guests of its Starwood hotel properties. But anytime we see such a colossal intrusion ...
More details>>
Read on krebsonsecurity.com
Tags: Safety, krebsonsecurity
23

Podcast: breaking down the magecart threat (part two)

Podcast: breaking down the magecart threat (part two)
Fuchsia Fuchsia 1 day, 23 hours ago
NewsletterSubscribe to our Threatpost Today newsletter Join thousands of people who receive the latest breaking cybersecurity news every day. The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detaile...
More details>>
Read on threatpost.com
Tags: Safety, threatpost
23

Because it’s friday: if planets were as close as the moon

Because it’s friday: if planets were as close as the moon
DotNetBoy DotNetBoy 2 days ago
What would the sky look like if Mars, Jupiter, Saturn, or Neptune were as close to us as the Moon is now? Well, other than the global calamity caused by extreme tides and general astrophysical disruption, it looks quite pretty. If Planets were as close...
More details>>
Read on blog.revolutionanalytics.com
Tags: Dev, sxp
24

Boost your vue.js workflow with vue cli 3

Boost your vue.js workflow with vue cli 3
Reena Reena 2 days ago
We can hardly imagine modern web development without the help of Command-Line Interface (CLI) tools. They tremendously facilitate and speed up the development workflow by reducing the amount of repetitive and tedious tasks. Setting up a project manually...
More details>>
Read on code.tutsplus.com
Tags: Dev, tutsplus
24

Nasa takes a tangible step back toward the moon with commercial program

Nasa takes a tangible step back toward the moon with commercial program
Llyods Llyods 2 days, 1 hour ago
Skip to main contentBiz & ITTechSciencePolicyCarsGaming & CultureStoreForumsSubscribeClose Navigate StoreSubscribeVideosFeaturesReviewsRSS FeedsMobile SiteAbout ArsStaff DirectoryContact UsAdvertise with ArsReprints Filter by topic Biz & ITT...
More details>>
Read on arstechnica.com
Tags: arstechnica, Studies
17

Microsoft warns of two apps that expose private keys

Microsoft warns of two apps that expose private keys
Trident Trident 2 days, 14 hours ago
NewsletterSubscribe to our Threatpost Today newsletter Join thousands of people who receive the latest breaking cybersecurity news every day. The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detaile...
More details>>
Read on threatpost.com
Tags: Safety, threatpost
10

Create an android app to recognize face contours with firebase ml

Create an android app to recognize face contours with firebase ml
Reena Reena 6 days ago
Firebase ML Kit, a collection of local and cloud-based APIs for adding machine learning capabilities to mobile apps, has recently been enhanced to support face contour detection. Thanks to this powerful feature, you no longer have to limit yourself to a...
More details>>
Read on code.tutsplus.com
Tags: Dev, tutsplus
<< Previous Page 1 2 3 4 5 6 7 8 ... 12 13 Next Page >>