Tags » Computing

Hackers are hiding malware in subtitle files

An impressive new exploit gives hackers the ability to control your desktop through malware spread by fake movie subtitles. The exploit, which essentially dumps the malware onto your desktop and then notifies the attacker, affects users of video players like Popcorn Time and VLC. 233 more words

TC

Kubernetes foundation takes on container networking

 (CNCF), which seeks to drive large-scale cloud computing with an emphasis on containers and microservices, has just added the Container Network Interface (CNI) project to its fold. 143 more words

IFTTT

A cloud storage architecture for the enterprise

Yaniv Romem is co-founder and CTO and Tom Leyden is VP of corporate marketing at Excelero

Tech giants such as Amazon, Facebook, and Google have redefined IT for web-scale applications, leveraging standard servers and shared-nothing architectures to ensure maximum operational efficiency, flexibility, and reliability. 110 more words

IFTTT

NHS Cyber Attacks

Some countries became attacked by a cyber gang known as the shadow brokers. Japan, Russia, UK, US, and South Korea and computers in various countries became hacked. 131 more words

Computing

Elasticsearch in Action

Book Review: Elasticsearch in Action, by Radu Gheorghe, Matthew Lee Hinman, and Roy Russo
In a previous job I’d come across Solr, but these days, I’m told, Elasticsearch is where it’s at, at least where I work now. 259 more words