Your source for IT news and tech tips.
Tesla Cloud Resources Are Hacked to Run Cryptocurrency-Mining Malware | Ars Technica | Add Tesla to the legion of organizations that have been infected by cryptocurrency-mining malware. Researchers at security firm RedLock said hackers accessed one of Tesla's Amazon cloud accounts and used it to run currency-mining software. "The hackers had infiltrated Tesla's Kubernetes console, which was not password protected," RedLock researchers wrote. | Detecting Malicious Insiders: A New Use Case for Data Loss Prevention | CSO | Considering the upcoming GDPR, increasing migration to the cloud, and BYO-everything, data loss prevention (DLP) technologies are making a resurgence. Symantec Senior Vice President of Information Protection, Nico Popp, describes how DLP has evolved over the years, and what the DLP of the future looks like. | The Pentagon Has the Worst PowerPoint Slides You’ve Ever Seen | Motherboard | The Internet Archive—the site that catalogs the world’s digital detritus—has scooped up hundreds of publicly available military PowerPoints and preserved them for public consumption. The Archive calls it the Military Industrial PowerPoint Complex and it's as bad as you’d expect a mix of high technology, bloody wars, and banal graphics to be. | | | Perform Text Analysis with IBM Watson and Google Docs | Digital Inspiration | IBM Watson uses Natural Language Processing (NLP) and machine learning to extract entities, people's names, and places, as well as understand the overall sentiment and emotion of text. Here's how to use Watson's NLP to analyze the text in your Google Doc. | How To Sign a PDF: The Best Tools for Electronic Signatures | MakeUseOf | Signing digital documents by hand is tedious. Print, sign, scan, right? Fortunately, electronic signatures are on the rise. Here is a selection of free and paid tools to conveniently sign PDF documents from your PC or phone. | |
|
|