Java vs. Node.js: An epic battle for developer mind share
Yes, Java has glitches and bugs, but relatively speaking, it's the Rock of Gibraltar. The same faith in Node.js is many years off. In fact, it may be decades before the JavaScript crew writes nearly as many regression tests as Sun/Oracle developed to test the Java Virtual Machine.
The debate whether to use Java or Node.js on your servers can and will go on for years. As opposed to most debates, however, we can have it both ways.
NSA planted surveillance software on hard drives, report says
In a new report, Kaspersky revealed the existence of a group dubbed The Equation Group capable of directly accessing the firmware of hard drives from Western Digital, Seagate, Toshiba, IBM, Micron, Samsung and other drive makers. As such, the group has been able to implant spyware on hard drives to conduct surveillance on computers around the world.
Kaspersky's analysis was right, a former NSA employee told Reuters, adding that the agency valued this type of spyware as highly as Stuxnet. Another "former intelligence operative" said that the NSA developed this method of embedding spyware in hard drives but said he didn't know which surveillance efforts used it.
Pot Could Save Your Life: 4 Ways Cannabis is Good for Your Brain
Now there is no doubt that cannabinoids cause new brain cells to grow in the hippocampus. This helps explain previous research showing that cannabinoids effectively treat mood disorders like depression, anxiety and stress – they are all related to a lack of adult neurogenesis.
Several recent studies have found that cannabinoids protect the brain from permanent damage after trauma or stroke.
The medicinal benefits of cannabis and cannabinoids are immense, and it’s time everyone is allowed full access to this amazing healing herb.
Should We Really Try to Teach Everyone to Code?
If businesses truly want to truly become innovative app companies, they need to turn every department into an IT department and make every employee part of the innovation process. If someone in marketing or finance or HR has an idea for a new app, they should be able to take matters in their own hands.
In order to empower everyone to build apps, we need to focus on bringing greater abstraction and automation to the app development process. We need to remove code — and all its complexity — from the equation.
Bank Hackers Steal Millions via Malware
Kaspersky Lab says that the scope of this attack on more than 100 banks and other financial institutions in 30 nations could make it one of the largest bank thefts ever — and one conducted without the usual signs of robbery.
Kaspersky Lab says it has seen evidence of $300 million in theft through clients, and believes the total could be triple that.
The silence around the investigation appears motivated in part by the reluctance of banks to concede that their systems were so easily penetrated, and in part by the fact that the attacks appear to be continuing.
Facebook bug could have ERASED the ENTIRE WORLD
Software engineer Laxman Muthiyah has reported a dangerous vulnerability capable of deleting any photo from Facebook, prompting The Social NetworkTM to patch the hole within two hours and issue one of its biggest bug-spotting cheques ever.
Muthiyah published a proof of concept video detailing the vulnerability and received praise from industry for finding the bug.
Live Patching Now Available For Linux
"You may never have to reboot your Linux machine ever again, even for kernel patching," and excerpts from the long (and nicely human-readable) description of newly merged kernel code that does what Ksplice has for quite a while (namely, offer live updating for Linux systems, no downtime required), but without Oracle's control.
Pwned in 7 seconds: Hackers use Flash and IE to target Forbes visitors
Hackers strung together zero-day vulnerabilities in Flash and Internet Explorer and then compromised Forbes.com so that the attacks would compromise financial services and defense contractor employees visiting the site, researchers said.
"Given the highly trafficked Forbes.com website, the exploit could have been used to infect massive numbers of visitors." Instead, only visitors from US Defense and financial services firms were hacked.
Microsoft Patches 41 Internet Explorer Vulnerabilities
Microsoft's first Patch Tuesday of 2015 did not patch a single Internet Explorer flaw. Today's February Patch Tuesday update is a very different story, with Microsoft patching a staggering 41 vulnerabilities in IE. In total, Microsoft patched 56 vulnerabilities spread across nine security bulletins.
"I cannot remember when a single Microsoft patch included 41 CVEs, let alone an IE update so large," Andrew Storms, vice president of Security Services at New Context, told eWEEK. "If you consider that all of the Microsoft patches in 2014 added up to 343 CVEs, then we are well on our way already to surpass that number in 2015."
Internet providers lobby against backup power rules for phone lines
The Federal Communications Commission is considering whether to impose backup power requirements on Internet providers that offer phone service, but cable companies and telcos don’t want to be required to keep customers connected through long power outages.
Not surprisingly, voice providers don’t want to face any new requirements. They argue that consumers have willingly switched from copper landlines to VoIP service despite carriers being required to inform customers of the power limitations. Customers are also increasingly using cellular service instead of landlines to make voice calls, they note.