Buy the laptop best for you: Windows 10 or MacOS, plus 10 more things to consider

We live in an age of miracles, when machines that fit in our pockets are capable of doing tasks that would have had us charged with witchcraft in earlier times.

But those pocket-sized miracles only go so far, and sometimes even stepping up to a tablet or a Chromebook isn’t enough to accomplish a particularly demanding task. For those occasions, only an honest-to-goodness PC will do. Which is why PC makers (including Apple) continue to sell more than a hundred million portable PCs and MacBooks every year.

If you’ve shopped for a laptop lately, you know that there are hundreds, maybe thousands of options available from OEMs large and small. That much choice can be paralyzing, which is why it helps to go through the specs carefully.

When a friend or colleague asks me “Which laptop should I buy?” I won’t even think of making a recommendation until we’ve gone

Read More

Banks failing to protect customers from coronavirus fraud

A paltry 13 out of the 64 banks accredited by the UK government for its Coronavirus Business Interruption Loan Scheme (CBILS) have bothered to implement the strictest level of domain-based messaging authentication, reporting and conformance – or Dmarc – protection to stop cyber criminals from spoofing their identity to use in phishing attacks.

This means that 80% of accredited banks are unable to say they are proactively protecting their customers from fraudulent emails, and 61% have no published Dmarc record whatsoever, according to Proofpoint, a cloud security and compliance specialist.

Domain spoofing to pose as a government body or other respected institution, such as a provider of financial services, is a highly popular method used by cyber criminals to compromise their targets.

Using this technique, they can make an illegitimate email appear as if it is coming from a supposedly completely legitimate email address, which neatly gets around

Read More

Supercomputers hacked across Europe to mine cryptocurrency

Multiple supercomputers across Europe have been infected this week with cryptocurrency mining malware and have shut down to investigate the intrusions.

Security incidents have been reported in the UK, Germany, and Switzerland, while a similar intrusion is rumored to have also happened at a high-performance computing center located in Spain.

The first report of an attack came to light on Monday from the University of Edinburgh, which runs the ARCHER supercomputer. The organization reported “security exploitation on the ARCHER login nodes,” shut down the ARCHER system to investigate, and reset SSH passwords to prevent further intrusions.

The bwHPC, the organization that coordinates research projects across supercomputers in the state of Baden-Württemberg, Germany, also announced on Monday that five of its high-performance computing clusters had to be shut down due to similar “security incidents.” This included:

  • The Hawk supercomputer at the High-Performance Computing Center Stuttgart (HLRS) at the University
Read More

US maintains ban on Chinese tech firms as Huawei, ZTE make 5G leaps

Chinese technology suppliers such as Huawei and ZTE have encountered contrasting fortunes from the US and German authorities regarding the usage of their technologies.

US president Donald Trump has extended an executive order signed a year ago that effectively banned US companies from using telecommunications equipment made by firms said to pose a national security risk, in effect companies such as Huawei and ZTE.

While not naming specific companies or territories, the initial ban aimed to “protect America from foreign adversaries who are actively and increasingly creating and exploiting vulnerabilities in information and communications technology infrastructure and services”.

On 22 November 2019, US communications regulator the Federal Communications Commission passed a resolution based on a proposal from its chairman, Ajit Pai, that fundamentally prohibited recipients of the regulator’s USF (Universal Service Fund) from using such money to buy equipment or services from companies perceived to be a risk to the

Read More