Strategy executive Michael Ferris, a 19-year veteran at Red Hat, says his company's culture has not changed since IBM's $34 billion buyout. Despite much industry speculation about culture clash once the deal closed, "It's about finding out what this means, the ways we can work together," he said, adding, "Our intent is to keep things as separate as possible when it makes sense."
Foldable phones and 5G technology will drive the future of the tech device industry, says Jessica Dolcourt, a CNET senior producer. And in the case of 5G, the applications will go far beyond fast smartphone downloads, with uses including remote surgery, smart city connections and autonomous-car safety.
Cryptocurrency thefts totaled $4.26 billion in the first six months of 2019, compared with $1.7 billion for all of 2018, according to CipherTrace. The cryptocurrency intelligence firm said hackers often employ multiple tactics -- including SIM swapping, phishing and URL hijacking -- to seize user and administrator accounts.
US Cyber Command has released a malware sample linked to North Korean hackers, uploading it to a security research database and offering a glimpse into the cybertactics of the APT38 financial-crime hacking group. A leaked UN report says North Korea is funding its weapons programs with the help of more than $2 billion stolen in cyberattacks.
The Hong Kong Science Park is home to 350 tech companies, including specialists in building information modeling and other technology for smart cities. Simon Wong, chief project development officer at the park's parent company, says the goal is to "collect valuable data to enable future innovation" on a smart campus through the use of artificial intelligence, big data and the internet of things.
The cybersecurity landscape changes daily with new means of attack, so cybersecurity professionals have to stay on top of their game, writes security specialist Roger Grimes. He outlines 12 broad categories of expertise that cybersecurity professionals need, including basic common defenses, cryptography, authentication and an understanding of cybercriminals' motives.
Microsoft has alerted Windows 10 users that they must update their operating systems because of two critical vulnerabilities. Those who manually update can access the tool by searching for "Windows Update," while those with automatic updates enabled are protected.
The Seattle woman charged with the Capital One data breach is suspected in dozens of other attacks, federal prosecutors say. Investigators found stolen data from more than 30 unidentified organizations, including schools and businesses, but unlike the Capital One breach, which exposed the data of more than 100 million people, the other breaches do not all involve personal information.
Hackers at the DEF CON conference in Las Vegas were given rare access to the F-15 fighter jet's systems, and they uncovered numerous vulnerabilities that could be exploited to disrupt the aircraft in flight. Will Roper, the Air Force's top acquisition official, said the flaws were the result of years of cybersecurity neglect during product development, a problem the Air Force is working to fix.
Managed security service providers and channel partners must work to better secure biometric data after the discovery that the Suprema BioStar 2 database breach exposed millions of records, writes Pam Baker. She notes the importance of third-party vendor access security and diligence in checking consumer transactions, and she warns against reliance on biometrics and artificial intelligence.