November 01, 2014

How Streaming Analytics Detects Fraud and Keeps Customers Happy
The most challenging aspect of fraud prevention is detecting it as it occurs across the entire account base. Because hackers can fleece individual accounts within seconds of infiltration on a large scale, if your security systems can’t detect fraudulent behavior within individual accounts in real-time, you are essentially compounding your losses with each passing second.  With streaming analytics, banks can continuously ingest, correlate, enrich, and analyze streams of data across diverse sources – including third parties – to immediately spot anomalies indicating fraud down to the second of occurrence and implement immediate automated remediation measures.

The Periodic Table of IoT
The promise of connecting devices across homes, retail stores, automobiles, and physical machinery, otherwise referred to as the Internet of Things, has emerged into what is now a substantial ecosystem of private companies, corporations, venture investors and acquirers. ... we’re excited to introduce the Periodic Table of IoT (Internet of Things) – a guide to help make sense of the key players in the growing Internet of Things universe. The 141 companies, investors and acquirers on the list were drawn from analysis using CB Insights data around financial health, company momentum, investor quality and M&A activity.

The 1s and 0s behind cyber warfare
Chris Domas is a cybersecurity researcher, operating on what's become a new front of war, "cyber." In this engaging talk, he shows how researchers use pattern recognition and reverse engineering (and pull a few all-nighters) to understand a chunk of binary code whose purpose and contents they don't know.

Why Microsoft loves Linux
Nadella admitted that 20 percent of the operating systems on Azure are Linux. The open-source operating system is already contributing a lot to Microsoft's bottom line. Today, Azure — while it doesn't support the top business Linux, Red Hat Enterprise Linux (RHEL) — already supports CoreOS Linux, CentOS, Oracle Linux, SUSE, and Ubuntu on Azure. ... It's not just Linux that Microsoft loves. After decades of resistance, Microsoft supports a variety of open-source programs such as the big data Hadoop; Docker containers; and Facebook's Open Compute datacenter project. Indeed, Microsoft is even open-sourcing more of its own technologies such as parts of .Net.

Security vendor coalition cleans 43,000 malware infections used for cyberespionage
So far the vendors’ disruptive action called Operation SMN resulted in the removal of 43,000 instances of malicious tools installed by the Axiom attackers on compromised computers, according to a full report published Monday by Novetta, the data analytics firm that led the coalition. The clean-up effort was done through Microsoft’s Malicious Software Removal Tool (MSRT), which is updated and distributed through Windows Update monthly, and through the security products of other vendors involved in the operation. One hundred eighty infections were instances of Hikit, a malware program used by Axiom for data exfiltration and persistence during the last stages of its attacks, Novetta said.

Data Science 101: Scalable Machine Learning with Apache Spark
In the presentation below, courtesy of the SF Machine Learning Meetup group in San Francisco, Xiangrui Meng introduces Spark and show how to use it to build fast, end-to-end machine learning workflows. Using Spark’s high-level API, you can process raw data with familiar libraries in Java, Scala or Python (e.g. NumPy) to extract the features for machine learning. Then, using MLlib, its built-in machine learning library, you can run scalable versions of popular algorithms. The talk also covers upcoming development work including new built-in algorithms and R bindings.

Learn to Boost Data Center Capacity With Public Cloud
Without a doubt, one of the most powerful benefits of cloud computing is the ability to extend the existing environment beyond the current datacenter walls. Administrators are able to do more with less as cloud computing components have become much more affordable. Now that both unified computing and WAN-based solutions have come down in price, IT environments are quickly seeing the direct benefits that cloud computing can bring to an organization.

Backup and restore of MySQL to OpenStack Swift
xbcloud uploads and downloads full or part of xbstream archive to/from OpenStack Swift. So what is xbstream? xbstream is a streaming format available in Percona XtraBackup that overcomes some limitations of traditional archive formats such as tar, cpio and others which did not allow streaming dynamically generated files, for example dynamically compressed files. Archive uploading will employ multipart upload for Large Objects on Swift. Along with this, the xbstream archive index file will be uploaded which contains list of files and their parts and offsets of those parts in xbstream archive. This index is needed for downloading only part of archive  on demand.

Major banks ready their own mobile payment apps
The most likely way will be through a technology called host card emulation, that was introduced in Android 4.4 “KitKat” and allows software apps to emulate the secure element chip found on some bank cards and the iPhone 6. Using software means wider compatibility with phones than if a dedicated chip was required. The mobile payments market had been relatively quiet until recently. Google Wallet and Softcard, a competitor backed by cellular carriers, were in the market but consumer awareness and interest appeared to be low.

Drupal warns unpatched users: Assume your site was hacked
"Attackers may have copied all data out of your site and could use it maliciously," the Drupal security team said. "There may be no trace of the attack." The vulnerability also allows the installation of multiple backdoors in the site's database, code, file directories and other locations and it's impossible for an administrator to say with complete confidence that all of them were found. Attackers may use such backdoors to attack and compromise other services on the underlying Web server, allowing them to expand their access beyond the website itself, the Drupal security team said.

Quote for the day:

“I suppose it is tempting, if the only tool you have is a hammer, to treat everything as if it were a nail.” -- Abraham Maslow

No comments:

Post a Comment