Remove Company Remove Open Source Remove Operating Systems Remove Windows
article thumbnail

China says “no thanks” to Intel and AMD on government devices

Dataconomy

processors from government-operated computers and servers, thereby excluding chips manufactured by Intel and AMD, according to a report by the Financial Times. Authorities above the township level are mandated to acquire processors and operating systems deemed “safe and reliable” as per the Financial Times. and China.

Intel 74
article thumbnail

Microsoft: Hackers in China, Iran and elsewhere start exploiting widespread Apache Log4j flaws

GeekWire

Microsoft says groups connected to governments in China, Iran, North Korea and Turkey have begun exploiting vulnerabilities in the Apache Software Foundation’s widely used open-source Log4j software library. Hackers can use the software flaws to gain control of compromised computers and systems.

Microsoft 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 176

Scott Lowe

And here’s another example of malware that is targeting Linux (along with Windows). This would be why I hate it when companies force me to use SMS for two-factor authentication—at least let me use a one-time passcode or something. Operating Systems/Applications Here’s one person’s take on sudo for Windows.

Linux 112
article thumbnail

Hackers Find New Life from ‘End of Life‘ Technologies

SecureWorld News

When technology companies close the support door on their old systems and software, it opens the gates for cybercriminals. The most recent example of this is for organizations using Windows 7. Windows 7 'End of Life' is a cybercrime opportunity. An unsupported operating system grants hackers easier pickings.

article thumbnail

How to maximize ROI by choosing the right Java partner for your organization

CIO Business Intelligence

Its versatility, reliability, stability, and open-source and third-party libraries and frameworks make developing and running applications very efficient. Providing scripts or working with qualified partners can help companies understand all the components in their Java fleets.

Oracle 52
article thumbnail

Lazarus APT Targeting Cryptocurrency, CISA Warns

SecureWorld News

Treasury Department warning of a North Korean state-sponsored advanced persistent threat (APT) known as the Lazarus Group targeting cryptocurrency and blockchain companies. The threat actors use social engineering to encourage individuals to download trojanized cryptocurrency applications on Windows or macOS operating systems.

Malware 79
article thumbnail

Citrix Acquires Sanbolic

Scott Lowe

I just saw the news that Citrix has acquired Sanbolic , a storage virtualization company that I’ve written about before. KVM seems to be the open source hypervisor of choice while VMware’s vSphere continues to dominate (for now) the commercial market—leaving XenServer with leftovers. TechCrunch also has a quick write-up as well.)