EternalRocks worm combines seven leaked NSA attack tools

Hard on the heels of the WannaCry ransomware attacks, a researcher has found a worm that combines four NSA exploits and associated attack tools, including EternalBlue used by WannaCry

Agile unlocked: Pivotal uses paired programming and PaaS to bolster cloud app development

Digital transformation consultancy Pivotal explains how paired programming, an empathetic work culture and open source PaaS help enterprises achieve their agile software development goals

Only 9% of parents want kids to be tech entrepreneurs

Study shows UK parents would prefer their children to have a traditional job such as doctor, teacher or lawyer

Dutch railway uses IoT to reduce people jams

Railway stations in The Netherlands are monitoring the movement of travellers to manage traffic flow and reduce people jams

Security Think Tank: Malware is sneaky

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

HSBC voice authentication tricked by twins

Twin brothers managed to trick HSBC’s voice recognition security system into giving account access to the wrong person

Middle East largely unscathed after WannaCry cyber attack

The impact of WannaCry on the Middle East was reduced due to the attack falling on a weekend, but it is a stark warning

Windows 7 accounts for most WannaCry infections

Statistics show that computers running Windows 7 accounted for the biggest proportion of machines infected with the WannaCry ransomware, while NHS suppliers are blamed for hampering patching by NHS trusts

Denmark's Spar Nord bank in app dispute with Apple

Danish bank Spar Nord considers legal dispute with Apple over the supplier’s rejection of mobile app

McAfee researchers test WannaCry recovery method

Although there is evidence that some victims of the WannaCry ransomware attack on 12 May have paid the attackers, there is no evidence that they are getting their data back

Manx Telecom streamlines its business with VMware NFV

After deploying an NFV platform to replace its IMS service, Isle of Man-based telco has seen substantial improvements to its business agility and processes

WannaCry ransomware attack should push hospitals to gauge certain tech

The WannaCry ransomware attack affected hundreds of countries and hundreds of thousands of systems, including health systems. Experts discuss what healthcare orgs need to do.

Command and control communications key to detecting threats

Malware command and control (C&C) communications are key to detecting advanced threats, according to a security researcher

How to simplify IT integration

Pressure on IT is mounting and point-to-point integration does not scale. Opening up APIs is one of the approaches now being considered

Interview: Claude Moraes, MEP and EU Civil Liberties Committee chair

Claude Moraes, chair of the European Parliament's Civil Liberties, Justice and Home Affairs Committee shares his views, concerns, reservations about EU-US data transfers, encryption and Brexit

Microsoft to open African cloud datacentre region in 2018

Software giant plans to capitalise on business demand for its cloud services in Africa by offering users access to locally hosted Azure and Office 365

Neustar launches international security council

Sharing information in the face of threats such as WannaCry is crucial for organisations to improve their cyber security capability, according to Neustar, which is making it easier to do

Brits expect driverless cars to outnumber normal cars in 15 years

Survey shows 42% of people think autonomous vehicles will make roads safer, but 46% admit they would not feel safe as a passenger in a driverless vehicle

Cloud provider snubs SAN for StorPool hyper-converged infrastructure

Coreix found costly SAN capex outlays too onerous so opted to build its own hyper-converged infrastructure from StorPool storage software and SuperMicro x86 servers

Interview: Mark Potter, CTO, HPE

The head of Hewlett-Packard Labs speaks to Computer Weekly about a new era of computing, where memory is no longer a constrained resource

Site Terms

1. Terms

By accessing this web site, you are agreeing to be bound by these web site Terms and Conditions of Use, all applicable laws and regulations, and agree that you are responsible for compliance with any applicable local laws. If you do not agree with any of these terms, you are prohibited from using or accessing this site. The materials contained in this web site are protected by applicable copyright and trade mark law.

2. Use License

  1. Permission is granted to temporarily download one copy of the materials (information or software) on TCB Inc web site for personal, non-commercial transitory viewing only. This is the grant of a license, not a transfer of title, and under this license you may not:
    1. modify or copy the materials;
    2. use the materials for any commercial purpose, or for any public display (commercial or non-commercial);
    3. attempt to decompile or reverse engineer any software contained on TCB Inc web site;
    4. remove any copyright or other proprietary notations from the materials; or
    5. transfer the materials to another person or “mirror” the materials on any other server.
  2. This license shall automatically terminate if you violate any of these restrictions and may be terminated by TCB Inc at any time. Upon terminating your viewing of these materials or upon the termination of this license, you must destroy any downloaded materials in your possession whether in electronic or printed format.
3. Disclaimer
  1. The materials on TCB Inc web site are provided “as is”. TCB Inc makes no warranties, expressed or implied, and hereby disclaims and negates all other warranties, including without limitation, implied warranties or conditions of merchantability, fitness for a particular purpose, or non-infringement of intellectual property or other violation of rights. Further, TCB Inc does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on its Internet web site or otherwise relating to such materials or on any sites linked to this site.

4. Limitations

In no event shall TCB Inc or its suppliers be liable for any damages (including, without limitation, damages for loss of data or profit, or due to business interruption,) arising out of the use or inability to use the materials on TCB Inc Internet site, even if TCB Inc or a TCB Inc authorized representative has been notified orally or in writing of the possibility of such damage. Because some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages, these limitations may not apply to you.

5. Revisions and Errata

The materials appearing on TCB Inc web site could include technical, typographical, or photographic errors. TCB Inc does not warrant that any of the materials on its web site are accurate, complete, or current. TCB Inc may make changes to the materials contained on its web site at any time without notice. TCB Inc does not, however, make any commitment to update the materials.

6. Links

TCB Inc has not reviewed all of the sites linked to its Internet web site and is not responsible for the contents of any such linked site. The inclusion of any link does not imply endorsement by TCB Inc of the site. Use of any such linked web site is at the user’s own risk.

7. Site Terms of Use Modifications

TCB Inc may revise these terms of use for its web site at any time without notice. By using this web site you are agreeing to be bound by the then current version of these Terms and Conditions of Use.

8. Governing Law

Any claim relating to TCB Inc web site shall be governed by the laws of the State of Virginia without regard to its conflict of law provisions.
General Terms and Conditions applicable to Use of a Web Site.