Mike Wheatley
Latest from Mike Wheatley
China Hacked The New York Times and Stole All of its Passwords
Hackers backed by China’s military are believed to have carried out repeated attacks on the New York Time’s cyber infrastructure, according to new claims by the newspaper. It believes that the attacks began around four months ago, and are likely to be retaliation for an expose it ran on the vast wealth accumulated by previous ...
Lenovo’s Protect & Attack Strategy Threatens Global Domination – Apple & Samsung Better Watch Out
We’ve all heard talk of how the post-PC era is supposedly looming on the horizon, but perhaps it would be wiser to ignore the proclamations of those who insist that the roof is about to cave in. Despite Apple’s Tim Cook insisting that people would “rather play on his iPad than their old PCs”, Lenovo ...
IBM Uses Big Data to Detect Insider Threats
Enterprise can derive useful insights from Big Data but this advantage comes at a cost, with large datasets rapidly becoming tempting targets for hackers and other cybercriminals. To counter this threat, IBM has just unleashed its latest security solution, Security Intelligence with Big Data, which aims to combine analytics with intelligence to head off these ...
Uh Oh, Kim Dotcom Could Be In Hot Water (Again)
Poor old Kim Dotcom has only just kicked open the doors to his new cloud storage service Mega, but less than two weeks in he could well be facing his first legal tangles with the emergence of a new “collaborative” search engine that allows users to search and share files hosted on the site. Called ...
Dell Buyout Edges Closer, but Microsoft’s Role Still Uncertain
Dell’s proposed buyout that would see it become a private entity once again remains on track and a deal could be announced in the coming days, although two key issues still need to be resolved according to reports earlier today. The most crucial issue appears to be with Michael Dell himself, with unnamed sources telling ...
Eric Schmidt’s Vision of the Future: Virtual Kidnappings, Drone Wars, and the End of Repression
Drone strikes targeting cyber-terrorists, hackers holding online identities hostage, and parents emphasizing ‘internet education’ ahead of sex education – this is the future that lies in store for us all, according to Google’s Eric Schmidt. “For citizens, coming online comes to mean living with multiple identities; your online identity becomes your real identity. The absence ...
Smartphone Sensors Could Give Up Your Passwords
Another day, another new security threat, only this time it comes from the unlikeliest of places. You know that accelerometer thingy in your smartphone – the sensor that makes sure the screen is always the right way up? Well, apparently it’s so incredibly ‘sensitive’ that it could potentially be holding secrets that hackers can exploit ...
Has Mobile Finally Paid Off for Facebook? Sure Looks That Way
After months of humiliation on Wall Street as its stock price went from bad to worse to embarrassing, Facebook raised quite a few eyebrows with an impressive Q3 performance in the area that matters most – mobile. Now, expectations are high that the company will build on those impressive gains when it releases its Q4 ...
Oracle Reinforces Its Commitment to the Cloud
Oracle gave a detailed outline of its plans for the year ahead yesterday, with President Mark Hurd reiterating the company’s broad cloud strategy across PaaS, IaaS and SaaS. There’s quite a few moves worth watching: Oracle is set to introduce storage sometime in the first half of this year; and it’s planning to roll out ...