Mike Wheatley
Latest from Mike Wheatley
Google Imagines a Future With No Passwords
Google is upping the ante where it comes to online security, outlining a dramatic new vision of a future where passwords will be shunted aside in favor of dedicated authentication devices for each user of the web. Naturally, it’s going to take a monumental effort to lead a shift away from passwords to its new ...
Intel Slump Not a Problem – Death of BYOD Just Around the Corner
In the wake of disappointing news regarding its Q4 profits, Intel CEO Paul Otellini remained surprisingly upbeat over its prospects for the future, insisting that the next generation of PC designs would soon subsume today’s tablet craze. Otellini’s comments came as Intel announced disappointingly slow fourth quarter sales of $13.5bn that only just met the company’s ...
Security Essentials Fluffs Malware Test; Microsoft Goes on the Warpath
Apparently Microsoft isn’t too happy with the outcome of a recent test that labelled its antivirus software as one of the worst performing around. The company has challenged the methodology used by Germany’s AV-Test, after its Security Essentials and Forefront Endpoint Protection programs failed to pass its tests and gain certification. Out of 25 such ...
Kim Dotcom Gears Up for MEGA Launch
Almost a year to the day after the original Megaupload was shut down by the FBI, fugitive internet tycoon Kim Dotcom is getting ready to launch the second coming of his file-sharing site from the safety of his Auckland mansion. Dotcom hopes that his latest venture, Mega.co.nz, will be able to replicate the overwhelming success ...
Phishing Sites Use Whitelisting Technology To Keep Out Unwanted Targets
One of the favorite tactics of businesses is to use ‘whitelisting’ to keep malicious visitors at bay, but now it looks as if cybercriminals have turned the tables on them, employing the same tactics so they can target specific victims, according to a new report by the RSA security firm. The report describes how hackers ...
Building Big Data: How Facebook’s Graph Search Was Born
Facebook’s revolutionary search strategy, Graph Search, represents an intriguing marriage of Big Data and social networking that should allow people and businesses to connect in dozens of new and exciting ways. In case you missed our earlier coverage, Graph Search is essentially an all-encompassing Facebook search engine based on your unique ‘social graph’ that allows ...
Facebook’s Open Compute Shapes the Future of Big Data Servers
When a company grows to the size that Facebook has, vendors no longer get to dictate the specs of its server acquisitions. Instead, the boot is on the other foot Facebook gets to determine exactly what it wants, with customized server requirements made especially to order to meet its unique and over-sized needs. Now, Facebook ...
New Java Flaw Discovered, Selling for $5K on Black Web
Oh dear, oh dear. Oracle must think it’s experiencing a bad case of déjà vu right now – just days after it released a patch for a ‘serious’ vulnerability discovered in its Java software last week, news has emerged of yet another serious flaw that could threaten the security of millions of PCs around the ...
US Power Plant Shut Down by Malware-Infected USB Stick
In a case that bears strong similarities to the highly publicized Stuxnet attack on Iran, two US power plants have befallen the same fate, becoming infected with malware via USB sticks, according to the Department of Homeland Security. In one of the two cases, both of which occurred last year, it’s believed that a technician working for ...
Software Developer Sacked for Outsourcing Job to China
Ever heard the old saying “work smarter, not harder”? Well, if you happen to be an employer of some sort, you might want to think twice before you go proffering this kind of advice to one of your underlings… The example of forty-something year-old software developer “Bob” is a fine case in point. Here we ...









