With built-in web servers. Yup, you read that right
Heathrow Airport is to get new air traffic control radio systems with a surprising amount of internet connectivity baked into them.…
Carillion scandal part of a long tradition of big supplier addiction
The scandal around Carillion has put the UK government's addiction to outsourcing in the spotlight. Yet it is a practice that has been going on for many decades - not least in public sector IT.…
Also, don't get the BOFH to publicly smack them with a LART
Usenix Enigma It's frustrating getting users to keep information and systems secure on a daily basis. However, don't try any smart gimmicks – particularly offering wedges of cash or other prizes for good behavior.…
Version 6.4 brings the NSX GUI to the vSphere client
VMware’s made no secret of its ambitions for its NSX network virtualization product, which it thinks has the potential to be bigger than server virtualization as organisations start to spread resources out across multiple clouds and on-premises bit barn.…
More than 500,000 users stung
A security researcher has claimed that half a million Chrome users have been hit by four malicious browser extensions pushing click and SEO fraud.…
Customers reported suspicious activity on their credit cards after making purchases on OnePlus' website.
The Asian nation has been a big adopter of virtual currency, so developments there have a global impact.
Multiplexing-over-UDP idea has hit the standards track, but is mostly ignored
Google's contribution to Internet standards, the fast-than-TCP thanks to multiplexing QUIC protocol, has yet to extend much beyond the Chocolate Factory, according to a German report into its adoption.…
The company only made around 4,000. Sadly, it looks like you have to be a world-class athlete to get one.
Brings in designers to apply a new coat of UI before world thinks it looks too shabby to run
Now that the open source email client Thunderbird is sleeping in a separate bed from Mozilla, the project has called on outside help for a UI redesign.…
Every video in its elite ad program will be scrutinized by human reviewers, while the bar has been raised for joining the program.
Good news – assuming software-defined storage is still viable after Meltdown/Spectre
Microsoft’s released a new Windows Server Insider Preview Build – number 17074, to be precise – and the most notable new bits are in the Storage Spaces Direct (S2D) software-defined storage code.…
The latest viral craze matches your photo to works from international museums and galleries. We asked CNET staffers to try it out, and the results aren't always flattering.
South America, Europe and Asia get pipes, DCs for Finland, Honkers and Hollywood
Google has made more investments in submarine cables, sinking money into three due to come online in 2019.…
Nice tech, but shame on Microsoft, Alibaba's spinners
Analysis Researchers from Microsoft and Chinese cyber-souk Alibaba separately claimed this week that their artificially intelligent software is as good as, if not better than, humans at understanding the written word.…
No active exploits, but crashes are happening in the wild
Back in 2000, a bug crept into the Internet Systems Corporation's BIND server, and it lay unnoticed until now.…
The Air is celebrating its 10th anniversary and I'm celebrating the one Apple product that's never let me down.
Researchers have uncovered four malicious extensions with more than 500,000 combined downloads from the Google Chrome Web Store, a finding that highlights a key weakness in what's widely considered to be the Internet's most secure browser. Google has since removed the extensions.
Researchers from security firm ICEBRG stumbled on the find after detecting a suspicious spike in outbound network traffic coming from a customer workstation. They soon discovered it was generated by a Chrome extension called HTTP Request Header as it used the infected machine to surreptitiously visit advertising-related Web links. The researchers later discovered three other Chrome extensions—Nyoogle, Stickies, and Lite Bookmarks—that did much the same thing. ICEBRG suspects the extensions were part of a click-fraud scam that generated revenue from per-click rewards. But the researchers warned that the malicious add-ons could just as easily have been used to spy on the people or organizations who installed them.
"In this case, the inherent trust of third-party Google extensions, and accepted risk of user control over these extensions, allowed an expansive fraud campaign to succeed," ICEBRG researchers wrote in a report published Friday. "In the hands of a sophisticated threat actor, the same tool and technique could have enabled a beachhead into target networks."
What do Cali, New York, Hawaii, Maine and 18 other US states have in common? Fighting the FCC on net neutrality
Attorneys General go to court to rescue internet protections
Twenty-two US State Attorneys General filed a lawsuit on Tuesday to undo the Federal Communications Commission's rejection of net neutrality in America.…
At CES 2018, the custom system builder showed off new ways to jazz up its systems as well as updates to the hardware.