rom Chrome 79 Update On Android Kills Local Data By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 15:18:03 GMT Full Article headline phone data loss flaw google chrome
rom The Chrome Web Store Is Currently Facing A Wave Of Fraudulent Transactions By packetstormsecurity.com Published On :: Sat, 25 Jan 2020 16:59:37 GMT Full Article headline cybercrime fraud google chrome
rom Google Chrome To Bar HTTP File Downloads By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 14:12:48 GMT Full Article headline privacy google chrome cryptography
rom Google Squashes High Severity Flaws In Chrome Browser By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:16 GMT Full Article headline flaw google patch chrome
rom Google Axes 49 Malicious Chrome Extensions From Web Store By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:06:51 GMT Full Article headline malware google chrome
rom CursedChrome Turns Your Browser Into A Hacker's Proxy By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:12 GMT Full Article headline hacker flaw google chrome
rom Russia To Disconnect From The Internet As Part Of A Test By packetstormsecurity.com Published On :: Mon, 11 Feb 2019 15:58:06 GMT Full Article headline government russia censorship
rom Facebook Denies Reports It Is Backing Away From Libra Cryptocurrency By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:42:30 GMT Full Article headline bank facebook cryptography
rom Hacker Leaks 23 Million Accounts From Webkinz Children's Game By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:35 GMT Full Article headline hacker privacy data loss password
rom 160,000 Nintendo Accounts Were Compromised By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:32:18 GMT Full Article headline hacker privacy data loss nintendo password
rom U.S. Records Its First Death From Coronavirus By packetstormsecurity.com Published On :: Sun, 01 Mar 2020 15:40:35 GMT Full Article headline government virus china science
rom FreeBSD Project Reveals Servers Were Compromised By packetstormsecurity.com Published On :: Mon, 19 Nov 2012 16:04:03 GMT Full Article headline hacker data loss bsd backdoor
rom Adware From French Runs Away And Hides On 12M Machines By packetstormsecurity.com Published On :: Thu, 28 Apr 2016 15:39:36 GMT Full Article headline malware france
rom Researchers Find Security Flaws In 40 Kernel Drivers From 20 Vendors By packetstormsecurity.com Published On :: Sun, 11 Aug 2019 18:14:44 GMT Full Article headline linux flaw conference
rom Critical Linux Wi-Fi Bug Allows System Compromise By packetstormsecurity.com Published On :: Sat, 19 Oct 2019 15:36:59 GMT Full Article headline linux wireless flaw
rom View from Asia: imagining the worst By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:03:58 +0000 What if the coronavirus lasts until the end of the year? Lawrence Yeo has a bleak forecast. Full Article
rom Oil-and-Gas APT From Magnallium Pivots To U.S. Power Plants By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 15:30:52 GMT Full Article headline malware usa cyberwar iran scada
rom Facebook Removes Foreign Interference Operations From Iran And Russia By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 14:43:12 GMT Full Article headline government privacy russia data loss fraud cyberwar facebook iran
rom How Many Microsoft Products Can My Nonprofit Request from TechSoup? By feeds.techsoup.org Published On :: Wed, 20 Sep 2017 23:30:00 GMT https://blog.techsoup.org/posts/how-many-microsoft-products-can-nonprofits-request Here is the short answer to the question of how many Microsoft products you can request: You can get 50 of each kind of product in a two-year period — but there are some exceptions. See Microsoft products What do you mean by "each kind of product"? The Microsoft Donation Program divides products into categories called title groups. See the current list of 37. A title group contains products that serve essentially the same purpose, like PowerPoint and PowerPoint for Mac. You can get products from 10 title groups in your two-year cycle. When does this two-year cycle start and end? Is it the calendar year? No. Your nonprofit has its own two-year cycle. Your first cycle started the day you requested your first Microsoft product through TechSoup. You can see when your current cycle ends on your Microsoft Donation Center page. Outlook and PowerPoint are both title groups. Does that mean we can get 50 of each product? That's right. They can be all the Windows version, all the Mac version, or a mixture of the two. And you will be able to request products from eight more title groups. What are the exceptions you mentioned? They have to do with servers. Microsoft offers two licensing models for its server products. Core-based licensing. This licensing is based on the number of cores in the physical processors of your server machines. The product page on TechSoup will tell you whether the server uses this type of licensing. You can request up to 50 of these products from each title group, the same as desktop products. But you might have to request more than one product to fully license all the processors in your server. Non-core-based licensing. You can request a total of five server products that do not use core-based licensing. They can be from a single title group or from different title groups, but the total cannot be more than five. A lot of the title groups are for CALs and MLs. What are the limits for these? You can get 50 from each title group. CALs, or client access licenses, give you access to a server from a device like your desktop computer. MLs, or management licenses, let your device be managed by a management server. Where can I find out more? This article goes into a lot more detail and gives examples of how the various allotments work together. spanhidden Full Article microsoft
rom Protecting Yourself from Malware with Better Password Security By feeds.techsoup.org Published On :: Fri, 20 Oct 2017 22:36:00 GMT 4 In Week 1 of National Cybersecurity Awareness Month (NCSAM) we looked at spoofed emails, cybercriminals' preferred method of spreading malware. Today, in an effort to provide you with the best information out there to keep you safe online, we're hitting you with a double dose of cybersafety news. Let's take look at the topics for Week 2 and 3 of National Cybersecurity Awareness Month: malware and password security. They're separate but related issues in the world of Internet crime prevention, and a better understanding of each is key to protecting your property and personal information in today's digital world. Malware Malware is an umbrella term used to describe software that is intended to damage or disable computers and computer systems. If you'd like, you can take a moment and watch this video on malware from Norton Security. But the best way to begin protecting yourself against this stuff is to learn about all the different types of malware that can affect your computer. There are tons, so we'll just go over the broader categories for now. Viruses: Malicious bits of code that replicate by copying themselves to another program, computer boot sector, or document and change how a computer works. Viruses are typically attached to an executable file or program and spread once a user opens that file and executes it. Worms: They're like viruses, but are different in terms of the way they're spread. Worms typically exploit a vulnerability or a weakness that allows an attacker to reduce a system's information assurance. Missed that last Windows update? You might be more vulnerable to worms. Trojans: These look like legitimate pieces of software and are activated after a user executes them. Unlike a virus or a worm, a trojan does not replicate a copy of itself. Instead, it lurks silently in the background, compromising users' sensitive personal data. Ransomware: This refers to a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking or threatening to erase the users' files unless a ransom is paid. You may recall the WannaCry attack that affected users across the globe this summer, only to be thwarted by the accidental discovery of a "kill switch" that saved people from the malicious software. Spyware: This malware collects your personal information (such as credit card numbers) and often passes this information along to third parties online without you knowing. You can check out more descriptions and examples of the types of malware that exist today at MalwareFox, a malware detection and removal software program. Tips for Protecting Yourself Against Malware Staying malware-free doesn't require an engineering degree. You can greatly reduce, if not completely eliminate, your chances of falling victim to malware by following these easy tips. Keep your operating system current. Keep your software up to date, particularly the software you use to browse the Internet. Install antivirus and security software and schedule weekly scans. At TechSoup, we're protected by Symantec Endpoint Protection. At home, there are dozens of solutions you can use to protect yourself (PCMag lists many here). Mind where you click. Think twice before you download torrent videos or free Microsoft Office templates from some random website. Avoid public, nonpassword, nonencrypted Wi-Fi connections when you can. Use a VPN when you cannot. Spread the Word Let people know that TechSoup is helping you become more #CyberAware by sharing a message on your social media channels. If you tag @TechSoup on Twitter, we'll retweet the first two tweets. Remember, we're all in this together. Password Security Now that we've covered the nasty stuff that can make your life miserable if it ends up on your computer, let's go over some password security tips to help prevent malware from getting there in the first place. Using best practices when it comes to protecting your passwords is a proven way to protect your personal and financial information. Curious how knowledgeable you already are? Watch this video and take this quiz to enter a drawing for a $25 Amazon gift card! First, let's go over some facts. Passwords are the first line of defense to protect your personal and financial information. A weak password can allow viruses to gain access to your computer and spread through TechSoup's or your family's network. It's estimated that 73 percent of users have the same password for multiple sites and 33 percent use the same password every time. (Source: Digicert, May 2014) Despite a small sample size of 1,110 U.S. adults, a recent YouGov survey still found that 28 percent of adults use the same passwords for most of their online accounts. (Source: Business Insider, October 2017). Best Practices for Effective Password Protection One great way to better protect yourself is by opting for a passphrase, which is much more difficult to crack than a single-word password. Here are some guidelines to creating one. Pick a famous quote or saying and use the first letter of each word. Add a number that you can remember. Capitalize one letter. Make it unique by adding the first letter of your company's name to the beginning or end of the passphrase. Make it between 16 and 24 characters. You should never write your password down, but if you must, never store user IDs and passwords together. Finally — even though it might seem unwieldy — you should always use a different password for each site that requires one. In today's world, everything is connected. A savvy hacker can easily breach your bank account, email, and medical records in one fell swoop if you're using the same password for all three. Additional Cybersecurity Resources In case you missed it, take a look at last week's post on recognizing suspicious emails. Need a little inspiration? Find out how TechSoup and Symantec are making a difference in the lives of at-risk teens. Get more security tips from the National Cyber Security Alliance. National Cyber Security Alliance Month — observed every October — was created as a collaborative effort between government and industry to ensure that all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved. spanhidden Full Article
rom View from the Middle East & Africa: small steps can have a big impact on tourism By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:01:06 +0000 Poor infrastructure and political instability deter tourism, but small and manageable steps to avoid chaos and promote hospitality can work wonders. Full Article
rom View from Middle East and Africa: SDGs need rich to support the poor By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:24:27 +0000 The UN Sustainable Development Goals aim to end global poverty, but poorer countries are struggling to hit them. More help from richer countries is crucial, writes Mazdak Rafaty. Full Article
rom Hackers Steal $25 Million Worth Of Cryptocurrency From Uniswap And Lendf.me By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:39 GMT Full Article headline hacker bank cybercrime data loss fraud cryptography
rom Global COVID-19 Apps Suffering From Flaws, Malicious Copycats By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:36:20 GMT Full Article headline malware virus phone spyware
rom Which FDI sectors could benefit from the coronavirus crisis? By www.fdiintelligence.com Published On :: Wed, 18 Mar 2020 15:07:32 +0000 Wavteq's Henry Loewendahl discusses which sectors retain potential for foreign investment amid the current global crisis Full Article
rom View from Europe: will European investment go local? By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:13 +0000 Long-dominant global supply chains look less tenable in the light of pressures ranging from pandemics to disasters, trade tensions and protectionism. Full Article
rom View from Middle East and Africa: UAE moves fast to combat Covid-19 By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:01 +0000 The UAE followed Singapore’s swift reaction to combat Covid-19, to preserve the health of its citizens. Now moves are in place to tackle the country’s economic wellbeing. Full Article
rom View from the Americas: new perspectives in a time of pandemic By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:03:51 +0000 The coronavirus pandemic could change human behaviour more permanently in future. Full Article
rom Nokia Bell Labs looks to make maximum impact from minimum sites By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:22:08 +0000 Marcus Weldon, chief technology officer of Nokia and president of its research arm Nokia Bell Labs, talks about what guided the decision to set up a new global R&D centre and the company’s strategy for driving innovation. Full Article
rom View from Asia: why Asia needs to nurture its tourism offering By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:01:15 +0000 Asia outstrips the world for tourist arrivals and is still experiencing growth. Constant maintenance and upgrade are essential to maintain this lead. Full Article
rom View from Asia: the crippling effect of coronavirus By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:23:57 +0000 China's coronavirus outbreak is having a seismic effect in Asia and beyond, writes Lawrence Yeo. Full Article
rom Red Hat Hack Prompts Critical OpenSSH Update By packetstormsecurity.com Published On :: Fri, 22 Aug 2008 10:17:11 GMT Full Article linux ssh
rom View from the Americas: the evolving political economy of FDI By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:00:59 +0000 We are currently in a state of heightened business and economic disruption and sociopolitical activism, which only looks set to intensify. Full Article
rom View from the Americas: time for action on SDGs By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:24:16 +0000 Giant investment firm BlackRock throwing its weight behind sustainability issues is sending a signal to the corporate world to respond urgently to global calls for action, writes Gregg Wassmansdorf. Full Article
rom Madeira vice-president eyes fiscal independence from Lisbon By www.fdiintelligence.com Published On :: Thu, 15 Aug 2019 11:00:53 +0000 Pedro Calado, vice-president of Madeira’s regional government, tells Sebastian Shehadi about the island's capacity for more upmarket tourism and its ongoing struggle to gain financial independence from Portugal. Full Article
rom Antwerp benefits from retail rethink By www.fdiintelligence.com Published On :: Wed, 16 Oct 2019 11:59:33 +0000 Antwerp has long been an attractive retail location in Belgium, while also offering investors an efficient and transparent planning process. Full Article
rom Middle East sees increase in investment from US By www.fdiintelligence.com Published On :: Mon, 09 Sep 2019 14:35:05 +0000 Investment into the Middle East region by US-based companies showed a notable increase between the beginning fo 2016 and the end of 2018. Full Article
rom Trump exempts bi-facial solar modules from import tariffs By feedproxy.google.com Published On :: 2019-06-13T15:50:54Z In an announcement that was celebrated by the solar industry, yesterday U.S. trade officials said that bi-facial solar modules, which are solar modules that produce energy on both sides of the panel, would be exempt from import tariffs. Full Article Monitoring News Solar Utility Integration
rom Stay chilled: Lessons for district cooling from the Gulf Cooperation Council By feedproxy.google.com Published On :: 2019-07-17T12:54:58Z Global demand for air-conditioning is projected to triple over the next 30 years, as the planet warms and urban populations grow, particularly in emerging markets. Meeting that demand will call for significant investments in new cooling infrastructure and the electrical generating capacity necessary to power it. Although traditional cooling technologies are expected to become more efficient in coming years, countries will need to plan for these additional loads, which will be expensive. Emerging markets can also make use of district cooling, an approach that the Gulf Cooperation Council (GCC), which consists of six Middle Eastern countries — Saudi Arabia, Kuwait, the United Arab Emirates, Qatar, Bahrain, and Oman — have successfully adopted. Full Article Energy Efficiency Microgrids Microgrids DER Opinion & Commentary
rom German clean-energy fund sees promise in US distributed solar development By feedproxy.google.com Published On :: 2019-07-23T10:56:00Z Germany-based clean-energy fund Hep Kapitalverwaltung AG agreed to invest $50 million to $80 million annually in a partnership to develop small solar projects in the U.S. Full Article DER Microgrids Rooftop News C&I Community Solar
rom Louisiana’s military families to benefit from ground-source geothermal and modern energy-saving devices By feedproxy.google.com Published On :: 2019-07-29T15:21:36Z Last week, Corvias announced that it had entered the final phase of its geothermal installation and energy upgrades effort at the U.S. Army’s Fort Polk in West-Central Louisiana, a milestone that once complete will not only modernize the aging infrastructure but save the Army significant money and benefit military families. Full Article Energy Efficiency News Geothermal
rom Who will benefit from the surge in behind-the-meter battery installations? By feedproxy.google.com Published On :: 2019-08-14T14:09:25Z The electric utility industry has been buffeted by two recent trends that threaten to upend the profitability, and in some cases the future viability of, those companies that are slow to adapt to a new, rapidly changing landscape. Specifically, in the past decade, the industry has had to grapple with both waning demand and the growth of distributed energy generation. Full Article Energy Efficiency DER News DER
rom Stanford researchers develop technology to harness energy from mixing of freshwater and seawater By feedproxy.google.com Published On :: 2019-08-15T12:04:45Z A new battery made from affordable and durable materials generates energy from places where salt and fresh waters mingle. The technology could make coastal wastewater treatment plants energy-independent and carbon neutral. Full Article Storage News Hydropower
rom UK local authority to produce all electricity from solar By feedproxy.google.com Published On :: 2019-03-01T07:00:00Z Two large-scale solar farms are set to make Warrington Borough Council the first local authority in the UK to produce all its own electricity from clean energy. Full Article Vehicle to grid Solar Utility Scale
rom San Francisco mulls creating its own 100 percent renewables-focused utility from PG&E wreckage By feedproxy.google.com Published On :: 2019-03-12T14:05:09Z What happens when a famously left-leaning city dives into the buttoned-down business of electric utilities? San Francisco may soon find out. Full Article News Hydropower Storage Bioenergy Wind Power Solar Geothermal
rom Germany generated more than 50 percent of electricity from renewables in March By feedproxy.google.com Published On :: 2019-04-02T13:02:05Z In a first for the country, Germany generated 54.5 percent of electricity from renewable energy in March 2019. This is according to data collected by the Fraunhofer Institute for Solar Energy Systems. Full Article News Editor's Pick Hydropower Storage Bioenergy Wind Power Solar Geothermal
rom Can the US government stop utilities from attempting to kill solar in Montana? By feedproxy.google.com Published On :: 2019-04-15T15:42:35Z In the years since its passage, Section 210 of the Public Utility Regulatory Policies Act (PURPA) has provided one of the few options for small producers of renewable energy to access electric generation markets controlled by monopoly utilities. The law requires a monopoly utility to purchase the output of certain small power producers known as “qualifying facilities” (QFs) at the utility’s “avoided cost”—that is, the cost the utility would incur to generate or purchase power in the absence of the purchase from the QF. Full Article Opinion & Commentary Solar Project Development Utility Integration
rom PJM looks to plug ‘leaks’ sprouting from patchwork of state carbon policies By feedproxy.google.com Published On :: 2019-06-03T14:02:04Z The nation’s largest electric grid operator is grappling with how to prevent state climate policies from merely pushing emissions — and costs — across state lines. Full Article News Hydropower Baseload Storage Wind Power Solar Geothermal
rom Trump exempts bi-facial solar modules from import tariffs By feedproxy.google.com Published On :: 2019-06-13T15:50:54Z In an announcement that was celebrated by the solar industry, yesterday U.S. trade officials said that bi-facial solar modules, which are solar modules that produce energy on both sides of the panel, would be exempt from import tariffs. Full Article Monitoring News Solar Utility Integration
rom New Tesla Roadster likely years away from production By www.motorauthority.com Published On :: Fri, 08 May 2020 11:45:00 -0400 At the reveal of Tesla's redesigned Roadster in 2017, the company said the car would start production in 2020. At the time we said the company was notorious for being late on deadlines, and we were right to say it. In a podcast interview with comedian Joe Rogan on Thursday, Tesla CEO Elon Musk said the redesigned Roadster would be pushed back to... Full Article