Open-sourced Project Concord was released this week for customers to start experimenting on.
Source: Why VMware is involved in blockchain | ZDNet
![]()

Open-sourced Project Concord was released this week for customers to start experimenting on.
Source: Why VMware is involved in blockchain | ZDNet
![]()
T-Mobile has reported a security incident which may have led to the exposure of personal data belonging to approximately two million customers.
Source: Hackers help themselves to data belonging to 2 million T-Mobile customers | ZDNet
![]()
The bug was found in the core infrastructure of Apache Struts 2.
Source: Critical remote code execution flaw in Apache Struts exposes the enterprise to attack | ZDNet
![]()
Ryuk ransomware attackers demand huge sums of Bitcoin for returning encrypted files in what appear to be highly targeted attacks.
Source: This new ransomware campaign targets business and demands a massive bitcoin ransom | ZDNet
![]()
While the Russian military run cyber attack was economically damaging, it doesn’t cross the threshold into warfare, claims report by Marsh.
Source: NotPetya malware attack: Chaos but not cyber warfare | ZDNet
![]()
If you haven’t checked out OneDrive lately, you’re missing out. Over the past two years, Microsoft has methodically added a raft of new features that can help you back up personal files and photos. In this post, I show you some of the most useful options for saving and sharing files and folders.
Source: OneDrive tips and tricks: How to master Microsoft’s free cloud storage | ZDNet
![]()
Over 20 severe bugs were found using only manual methods by a single cybersecurity group.
Source: OpenEMR security flaws could have exposed millions of patient records | ZDNet
![]()
Vulnerable devices like routers and webcams are providing an easy means of cyber criminals conducting attacks – and staying anonymous while doing it.
Source: IoT security warning: Your hacked devices are being used for cybercrime says FBI | ZDNet
![]()
MicroTik… what were you thinking…
A patch was turned into an exploit and the exploit was turned into… why, CRYPTOCOINS, of course! Fortunately, there’s an easy fix.
Source: Routers turned into zombie cryptojackers – is yours one of them?
![]()
Um… they have always been cooler because you could always build them yourself if you wanted.
![]()
It’s time to admit that PCs now beat Macs on both tech specs and price.
I’m going to say something that I thought I’d never say.
Here we go… PCs have evolved to the point where they are now better and cooler than Macs.
There, I’ve said it. I feel better.
Source: Let’s face it: Windows PCs are now just better — and cooler — than Macs | ZDNet
![]()