Go to Top

Other

The Risk of Reusing Smartphone Memory Chips in Brand New USB Drives

Where do your USB drives come from? At an international computer forensics conference in March of this year, experts and law enforcement collaborators discussed a serious challenge investigators are facing when analyzing data from USB drives. Martin Westman, digital forensics and storage media expert, and Aya Fukami from the National Police Agency Japan, have found evidence that in some cases, old data from former computer users can be found on …Read More

Apple macOS High Sierra and APFS – what can we expect?

Since the inception of Apple Inc., we have seen groundbreaking products come to life, like smartwatches, iPhones, iPads, Apple TV, an Apple Server and a variety of Apple computers.  The company developed different operating systems for each range as well: watchOS for smart devices, iOS for iPhones and Tablets, tvOS for Apple TV and macOS for. However, the file system used in these operating systems still relies on the 30-year-old …Read More

Wearable Technology: What is LEVI’S® Commuter Jacket?

Once upon a time, there were smartwatches… now there is a cyber-jacket Only a few years have passed since wearable technology first appeared with smart watches.  The sweeping technology continues its trail-blaze with jackets. The project in question is called Jacquard Project and was developed by Google ATAP (Advanced Technology and Projects). A little backstory This is the name Google has chosen for a particular weaving system (this weaving system …Read More

Docker Containers will Transform IT Industry

What Are Docker Containers? Docker can efficiently create, ship and run containers.  Docker containers wrap an application’s software into an invisible box with everything it needs to run.  This includes, the operating system, application code, runtime, system tools and libraries.  Docker uses images to build containers.  They are lightweight and portable and allow developers to build, transfer and run distributed applications efficiently.  In addition, it allows to pack and move an …Read More

New Petya Ransomware Strikes Around the Globe

New Petya Ransomware Makes Disruptive Debut Spanning back to the early 1990s and making a brief reappearance in early 2016, a variant of Petya Ransomware (also called Petrwrap) has resurfaced once again, this time referred to as Petya A or NonPetya.  As far as what is already known, Petya has hit companies, public health care and government organizations and airports in the U.S., Russia, Ukraine, Germany, France, Italy, Poland and …Read More