Not everyone even remembers VHS, let along Betamax recorders, but an interesting clip on why the better product actually lost.
Not everyone even remembers VHS, let along Betamax recorders, but an interesting clip on why the better product actually lost.
Good stuff!
Don’t be fooled by this counterfeit trick. The numbers on the $10 dollar bill are covered with special decals that look exactly like a $50 dollar bill. Remember, Ulysses S. Grant is on the 50 dollar bill, not Alexander Hamilton who would be on this counterfeit bill as it’s really a $10 dollar bill.
The National Vulnerability Database reported an average of 19 vulnerabilities per day in 2014. Although that figure is an average across all areas, it’s still staggering and sobering to realize that 7,038 new security vulnerabilities were added to their database last year (not to mention what could be countless others that went unreported).
GFI Software recently crunched the numbers, separating vulnerabilities by distribution type and coming up with a list of the top operating systems as it relates to reported vulnerabilities. Here’s what they found.
In terms of distribution, a whopping 83 percent of vulnerabilities were found in applications while 13 percent were related to operating systems. The remaining four percent was credited directly to hardware issues.
Looking at operating system vulnerabilities, you may be surprised to learn that Microsoft is no longer among the top three in terms of reported security issues. The number one spot goes to Apple’s Mac OS X with 147 total vulnerabilities reported last year – 64 of which were considered high-level threats.
Second place belonged to another Apple operating system, iOS. Of the 127 reported issues, 32 were considered to be top-priority threats. Rounding out the top three was Linux with 119 reported incidents. Only 24 of them, however, were deemed high-level vulnerabilities.
It’s worth mentioning that the remaining seven operating systems in the top 10 were all Microsoft products. Specifically, Windows Server 2008, Windows 7, Windows Server 2012, Windows 8, Windows 8.1, Windows Vista and Windows RT – in that order. If you were to consolidate all of those into a single “Windows” category, then Microsoft would jump ahead of all others by a sizable margin.
Internet Explorer topped the list of application vulnerabilities followed by Google Chrome and Mozilla Firefox. To see a trio of browsers at the top is no surprise given our heavy reliance on the Internet.
Merry Christmas to all the gamers. Xbox Live and PlayStation network are down today due to what appears to be a DDoS (denial of service) attack. A few weeks ago, the hacker group Lizard Squad threatened to take both services down on Christmas. They have taken the services down before, and their Twitter feed is indicating they are at it again. Lets hope they back off soon as Sony and Microsoft are basically at their mercy until they do.
Unfortunately many games require that the user be logged into Xbox Live or PlayStation Network before they can play, and with today being Christmas there are surely many people with new game consoles and games they are wanting to play. Ba humbug!
The Federal Trade Commission (FTC) has released a Scam Alert addressing a “Package Delivery” themed phishing campaign regarding package delivery notifications from the U.S. Postal Service. Scam operators often use false information linked to reputable organizations to imply the email is legitimate.
Users are encouraged to review the FTC Scam Alert for details, and refer to the Recognizing and Avoiding Email Scams Publication for information on email scams.
Map of US Shows How Your State’s Internet Speed Stacks Up Against the Rest.
Cable companies have WAY too much control of the internet market.
This is why you shouldn’t try pranking your Dad (or Mom) they aren’t as clueless as you think! Nice job mom and dad!
You may want to start looking up. Drones, along with software are able to easily pull information off your cell phone while flying above. User names, passwords, credit card information. Nothing is safe.