|
New research from Hornetsecurity finds that 40 percent of all inbound emails pose a potential threat, including spam, phishing and advanced threats such as CEO fraud and any type of malware. Best to delete them all to be safe
|
|
|
|
|
OK I'll bite. What is "CEO fraud"?
I could think of a number of definitions (roughly as many as CEOs I have met )
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
That would have been my guess as well, but it seems it’s someone posing as the CEO to get someone to do something.
From CEO Fraud | KnowBe4[^]:
Quote: CEO Fraud is a scam in which cybercriminals spoof company email accounts and impersonate executives to try and fool an employee in accounting or HR into executing unauthorized wire transfers, or sending out confidential tax information.
TTFN - Kent
|
|
|
|
|
Why not say 90% are potential threats?
|
|
|
|
|
Microsoft's Azure and Research teams are working together on the 'Singularity' AI infrastructure service. At least they didn't codename it 'Skynet'
"At the heart of Singularity is a novel, workload-aware scheduler that can transparently preempt and elastically scale deep learning workloads to drive high utilization without impacting their correctness or performance, across a global fleet of accelerators (e.g., GPUs, FPGAs)."
That sentence should cause more than a few wins for people playing Bafflegab Bingo
|
|
|
|
|
Pick a starting point (typically in the frontend) and following it all the way through to the backend to gain some bearing. Maybe you'll strike oil
...black gold, Texas tea...
|
|
|
|
|
Kent Sharkey wrote: Maybe you'll strike oil or drown in the cement pond.
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|
If the experienced devs give you issues to track down and fix that comes naturally. Drilling is the only way that ever worked for me.
GCS d--(d-) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
Computers are getting smaller and smaller, just as current cell phones offer computing power similar to that of a laptop. And it probably lasts longer than the battery in this laptop
|
|
|
|
|
How long before someone runs Doom on it?
I’ve given up trying to be calm. However, I am open to feeling slightly less agitated.
|
|
|
|
|
C# 7.2 introduced the structure System.Span<t>. First we’ll present a concrete example where Span<t> helps achieve better performance. Then we’ll explain what makes Span<t> so special. If only there were some other language that's really good at array processing and dealing with other blocks of memory
|
|
|
|
|
2021 State of JS survey of JavaScript developers also finds significant growth in the use of WebAssembly and Progressive Web Apps. People like stronger typing? Who knew?
I'm assuming he meant "leaps" there.
|
|
|
|
|
We don't know much about Deskmodder.de's alleged inside source at Microsoft, but the German site claims it has information that the Redmond software giant has either started or is on the verge of beginning the development of Windows 12 The next, last version of Windows?
|
|
|
|
|
Like "The ultimate version".
When the IBM PC was young, I heard discussions about which of the clones were "The most 100% IBM PC compatible" . Nowadays, we talk about "The most ultimate version". Next year we will have an ever ultimater version that the ultimatest version we have today.
|
|
|
|
|
Two hundred and fifty-four tokens were stolen over roughly three hours We'll be minting a sympathy card on the Ha-ha blockchain
It seems 'cryptocurrency' enthusiasts are not into 'cryptosecurity'
|
|
|
|
|
Cryptocurrentshcy investors are not techies, they are the same people that caoused the great .COM bubble 20 years ago. And scammers. Ponzi schemes will always attract people.
GCS d--(d-) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
The James Webb Space Telescope team continues to make progress in aligning the observatory's mirrors. How many stars am I holding up?
|
|
|
|
|
There! Are! Four! Lights![^]
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
How do you get your kid to put down the tablet? Easy. Nuke your whole town's internet connection. But it worked!
|
|
|
|
|
|
How realistic is it to build a Faraday cage for a house or room, to keep out wireless signals?
I guess that adding it to an existing building is not a viable option, but what if you include it from the early planning stages for the building?
I know Faraday cages only from physics lessons as a student, and got the impression that to keep electromagnetic radiation out is a piece of cake. It seems to be far more difficult in practice!
The elevator in the office building at work has steel plates in all walls, ceiling and floor. The door is of steel. The signal meter on my phone is not at all affected; the phone worked flawlessly from within the elevator, even when down in the basement.
If it really was simple, you'd think that shading movie theaters and ordinary theaters, schools etc. would be standard practice - but my experience is that phones work fine in all such areas. So it seems like either shading can't be done very efficiently, or (maybe equally likely?): No one dare to deprive anyone of their god given right to use their phones absolutely everywhere, without any restriction whatsoever. (I guess that if the father had succeeded in permanently shade the little girl's room completely, all the time, it could have a negative effect on the father-daughter relationship.)
Can anyone tell? I am planning extensions to my house that includes a home movie room. I'd like to make sure that none of my guests will be able to disturb the movie watching e.g. by looking up details from Wikipedia or IMDb about the movie or actors or music while the movie is running Is there any chance of succeeding in this? I am fond of cabled computer connections, so even though I will have a computer in the movie room, shading WiFi as well, it is great! (And it will keep my guests from asking for access rights to my WiFi network to look up info in Wikipedia / IMDb because the mobile signals have disappeared ...)
|
|
|
|
|
There are four general requirements for a Faraday cage:
- The cage must be complete - no holes in the ceiling, floor, doors, or windows.
- The cage must be made of electrically-conductive material
- The distance between the cage's "bars" must be smaller than (some fraction of) the shortest wavelength that you wish to block
- The faraday cage should be grounded
If you wish to stop everything up to Wi-Fi 6E (6GHz band), you will need a separation between "bars" of no more than 3x108/6x109 = 5x10-2 meters.
A few layers of metal mosquito netting covering the floor, walls, ceiling, doors, and windows should create a decent Faraday cage for Wi-Fi and cell-phone signals.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
OR you could just take the device away from the child.
I’ve given up trying to be calm. However, I am open to feeling slightly less agitated.
|
|
|
|
|
I was referring to trønderen's idea of building a Farady cage around his TV room. I agree that for children the best solution is to take away their phones when they aren't supposed to be using them.*
(*) Assuming that the kids aren't bigger and stronger than you are...
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|