Monthly Archives: February 2018
Google Says It Paid Nearly $3 Million to Bug Hunters in 2017
Google last year paid $2.9 million in total to bug hunters who found security vulnerabilities in its products and services.The amount is slightly less...
36 Indicted for Participating in Cybercrime Ring That Stole $530M
The long arm of U.S. justice has once again reached out around the world to identify those responsible for cybercrime.On Feb. 7, the U.S....
SpaceX’s Falcon Heavy Rocket Ushers in New Era in Space Operations
Today’s topics include a look at what the SpaceX Falcon Heavy launch means for private industry; a former Intel president launching chip company Ampere...
10 Reasons Why HP’s EliteBook 800 G5 Will Appeal to Enterprise Users
10 Reasons Why HP's EliteBook 800 G5 Will Appeal to Enterprise Users
HP is looking to build off last year’s success in the PC market...
LinkedIn’s AI-Enabled Resume Assistant for Microsoft Word Is Live
After months of testing, LinkedIn's Resume Assistant is now available to Office 365 users.The AI-enabled resume builder for Microsoft Word was first released to...
Panasonic’s Toughbook 20 Rugged 2-in-1 Gets Faster CPU, Standard SSD
Panasonic has revamped its Toughbook 20 rugged 2-in-1 portable with a faster Intel Core i5-7Y57 vPro processor and an included 256GB SSD storage drive...
New Feature In Google Drive Improves Interoperability with Microsoft Office
Organizations using Google Drive to store and share files in the cloud now have an easier way to interact with Microsoft Office files, PDFs...
Microsoft, Google Up the Ante in Enterprise Cloud Wars
Microsoft wants your cloud business so badly, it's willing to give you free access to OneDrive to get it. The deal, according to Microsoft's...
Dell EMC Adds Epyc-Based Servers to Portfolio
Dell EMC is turning to Advanced Micro Devices and its Epyc processors to power three new servers that company officials are targeting at the...
Water Utility in Europe Hit by Cryptocurrency Malware Mining Attack
Unauthorized crytocurrency mining attacks, sometimes referred to as "cryptojacking" have found a new target - operational technology used in critical industrial infrastructure.Security firm Radiflow,...