KPMG Study: Breaches Up, Security Spending Down
http://www.darkreading.com/vulnerabilities—threats/kpmg-study-breaches-up-security-spending-down/d/d-id/1326415 →
http://www.darkreading.com/vulnerabilities—threats/kpmg-study-breaches-up-security-spending-down/d/d-id/1326415 →
http://www.zdnet.com/article/nist-blog-clarifies-sms-deprecation-in-wake-of-media-tailspin/ NIST wants two-factor-authentication to be widely used – but does not want SMS to be a factor in this. There are good reasons for both recommendations. →
https://www.hackread.com/whats-app-chat-encryption-myth/ WhatsApp uses end-to-end ancryption for message sending, but the app can leave even the deleted messages accessible. →
http://blog.beautheme.com/top-10-internet-of-things-iot-programming-languages/ →
http://www.macworld.com/article/3088057/internet-of-things/what-s-being-done-to-improve-security-for-the-internet-of-things.html →
Finland is in northern Europe with an area of 338,432 km2 of which 72% forest, 10% water, 8% cultivated land. Energy in Finland 2016 publication gives you overview of energy consumption in Finland. →
http://spectrum.ieee.org/telecom/security/protecting-gps-from-spoofers-is-critical-to-the-future-of-navigation?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+IeeeSpectrum+%28IEEE+Spectrum%29&utm_content=FaceBook GPS is very widely used and vulnerable to spoofing. This article gives introduction to GPS and what could be done against spoofing attempts. →
http://www.infoworld.com/article/3098426/open-source-tools/your-fear-of-open-source-lock-in-is-ridiculous.html Article on lock-in in software business – and how open source and cloud are different than proprietary software. →
http://www.geek.com/news/horrifying-real-world-lego-figure-cosplay-1663776/ Quote amazing LEGO cosplay →
http://www.zdnet.com/article/windows-10-telemetry-secrets/ This article tells what kind of data Windows 10 collects and how. →