When I was in primary school and growing up, innovation wasn’t that well known in the classroom. We would have a projector overhead which would simply demonstrate words or expressions greater for the whole class to peruse in the meantime. Yet, other than that, the educator would have a PC and that is it. Innovation has had an effect with training beginning at the more youthful evaluations and progressing through school. The issue that I need to acquaint is the way with utilize this innovation that we have been given to encourage the training and the youthful personalities in the primary educational systems.
There are numerous aces for having innovation in the classrooms of more youthful eras, for example, innovation permits your class to have moment access to data that can supplement their learning knowledge. When you are instructing a lesson or need a case of particular substance you’re instructing, children can turn that particular data upward online and ready to say the answer or share what they have discovered online to the class permitting connection between the children. So as opposed to raising your hand for noting the inquiry, they can demonstrate the instructor and the class more about the particular theme. Understudies will likewise have the capacity to learn life abilities through innovation, for example, gazing something upward online to discover more data about that point or watch “how to” recordings on specific subjects. Understudies will capable have the capacity to make presentations, figure out how to separate solid structure problematic sources on the web, keep up legitimate online behavior, and ready to figure out how to impart on the web. These are all key abilities youthful understudies will have the capacity to learn with the assistance on innovation in their classrooms.
Why do we require innovation in primary schools? Well as indicated by an infographic distributed by Everyday Family, 54% of 21st century kids begin utilizing cell phones when they are 5 to 8 years of age. 30% of the applications on guardians’ versatile are downloaded exceptionally for their youngsters’ use. 77% of the guardians acknowledge that use of tablet builds kids’ learning and inventiveness. 72% of iTunes top offering applications are intended for preschoolers and rudimentary understudies. Why is this data essential? This demonstrates kids at this moment can get to innovation at home and are urged to utilize it. So why not in the schools that they are learning at? Giving this open door for children will give them a feeling of a recognizable domain and will be more disposed to fan out and investigate the approaches to accomplish with the assistance of innovation gadgets. With this reason, having innovation in classrooms for children to utilize is only an undeniable response for me
A lot of people are not well-versed in the benefits of ecommerce CRM services and products. While they may have run businesses for many years, these individuals prefer to use old fashioned methods when it comes to customer service, data collection and data analysis. The truth is that all of these functions are a now fully integrated into an ecommerce CRM software solution for online retailers. Here’s a quick look at how these newer SaaS platforms are helping to change the way ecommerce does business.
Instead of spending hours going through customer data and attempting to analyze this information, companies can use this software and get the analysis part done within minutes. The best part is that ecommerce CRM software is designed to analyze this data in many different ways. Depending on your company’s size and the industry where it operates, the analysis can vary.
Some companies may want to know when customers are doing the bulk of their shopping. They may want to know whether certain months, days or periods of the day are busier than others. This can help them shape their service during those hours in a more efficient way. Other companies may want to use the ecommerce CRM to understand whether customers are happy with the new products they are offering. In both of these cases, analysis is a very important part of the equation. It is no good having all of this data if you have to spend the time figuring out what it means. But with the right software, the frontend interface will show you the analysis results you want.
Aside from analysis, the CRM software really excels because it gives your company a front end interface that is so easy to use. Even employees who have started working at your company a few days ago will have no problem using this software. It only takes a few minutes to get familiar with how the frontend interface operates. There are many different types of software on the market that companies can use to gather and use customer data. However, CRM is the perfect combination between data collection, analysis and ease-of-access.
When an employee needs to talk with a customer, they can immediately pull up a file on this individual. The file will include information about when the customer first started doing business with the company. Perhaps they bought a product one year ago. If they have made several purchases since that date, the interface will immediately show this information. By knowing what a customer bought and when they bought these items, it is much easier for an employee to help this individual with their query.
In the modern economy, it is so important for companies to prioritize efficiency and communication. Every minute that an employee needlessly spends trying to find data, they are missing out on possible interactions with customers. The truth is that customers also expect more from online retailers these days. When they call in and ask a question, they want the employee to know what they are talking about. This is a lot easier to handle when you have CRM software backing you up.
Bring your website to the next level, website owners should consider ComeChat as their solution to gather internet users around the globe who look for certain information from your site staying a little bit longer, and somehow come back. The idea about chat application for website is not a new thing as you can find many website owners or maybe yourself use a certain chat application. However unfortunately, that chat application can’t build a solid formation for your customer base. But it is the different when it comes to the first mentioned chat application as you get more than that.
Speak of the chat application, it is a software systems which can be chosen depend upon the website needs. Small website can consider to choose basic version of the software with limited feature for more affordable price that is known as Professional Plan. Though the feature is pretty basic, your users still find that your website still is interesting. And you can switch your plan for the software if you think necessary. Meanwhile, another two are Premium and Platinum Plans which are not only more pricey, but it is also followed which more feature to add enhancement to your website.
This chat application covers anything that is essential for worth mentioning software system that should be considered by any website owners to pack their website with number of visitors. You can choose text chat for both chat room and private. In addition, you can add smileys and also sticker that bring dramatic effect towards the words. In the case that your users or even you meet another users that speak with different language, the translator tool that is integrated with the software system will help you a lot.
Video conference and video call that become another great feature from the chat software that brings such a huge impact to make the conversation real time. Let say that your users want discuss something about products/information/services that you offer where text chat is not enough, video call feature is really facilitating. Do you want to increase your business customer base? This chat software has Facebook integrated in the system. How it works? For anything that you publish like your brand new products or some, in the same time it will be also published on your Facebook page. The latest version of this software surprises its users as they can also chat with their Gtalk and also Facebook friends.
This accident, the first caused by a self-driving car after nearly 2.4 million kilometres of autonomous driving, suggests that Google’s vehicles still need more common sense. A human driver would probably have just driven over the sandbags.
Researchers at the University of La Laguna in the Canary Islands are building a system which might have helped Google’s Lexus see the sandbags for the non-threat they were. They use Microsoft Kinect cameras, originally developed for the Xbox One gaming console, to improve self-driving cars’ obstacle avoidance at close range.
Self-driving cars typically use a combination of sensors to detect and avoid obstacles. Radar and laser-based lidar systems are generally used for objects at long range, while ultrasonic detectors and stereo cameras sense cars and pedestrians closer in.
Obstacles close to the ground like ramps, kerbs and sandbags are difficult to make out, says Javier Hernandez-Aceituno, lead author of the study: “Laser-based sensors are not suitable for this task because they detect ramps as obstacles. Ultrasonic sensors are also unsuitable due to their low precision.”
Hernandez-Aceituno decided to try using a Kinect, a depth-sensing camera that uses an infrared laser to capture an instantaneous 3D map of objects up to about 4 metres away.
Last year, he and his colleagues installed a Kinect on an experimental golf cart called Verdino. A low-speed self-driving vehicle, Verdino is also equipped with laser rangefinders and stereo cameras from a PlayStation 4.
They set the Verdino loose on an outdoor course with ramps, kerbs and stairs, using one obstacle detection program to process data from all the sensors.
The laser rangefinder ignored the lowest steps and incorrectly decided that the ramp was too steep to navigate. The camera gave inaccurate results for very near and far obstacles, and suffered from false detections.
The Kinect, however, produced more accurate results and fewer false positives than the stereo camera. Its biggest problem was spurious obstacles created by reflections of sunlight, although Hernandez-Aceituno was able to filter these out.
“The Kinect sensor vastly outperforms stereo vision at accurately detecting obstacles on the road,” says Hernandez-Aceituno, “[and] allows an autonomous vehicle to navigate safely in areas where laser rangefinders cannot detect obstacles.”
Researchers at the Pohang University of Science and Technology (Postech) have created a miniature fuel cell they claim not only provides enough energy to keep a drone in the sky for over an hour, but may well find applications in powering everything from smartphones to cars in the not-too-distant future.
Developed by Professor Gyeong Man Choi and his Ph.D. student Kun Joong Kim at Postech, the new solid oxide fuel cell (SOFC) is claimed by the researchers to be the first to use porous stainless steel in combination with thin-film electrolyte, all brought together using a technique known as tape casting-lamination-cofiring. Allied with electrodes of low heat capacity, this amalgamation not only results in increased performance, but also in higher long-term durability.
The team has aimed to improve upon previous SOFCs that used silicon but whose lithographically-etched components exhibited rapid degradation or low durability when experiencing thermal-expansion during operation, resulting in physical alignment problems with the electrolyte. As a result, silicon-based fuel cells are, according to the researchers, not seen as a viable replacement in electronic devices that require fast on/off capabilities. Using stainless steel, the team claims to overcome the biggest problems that have dogged SOFCs, namely the high operating temperatures of the units that results in longer start-up times and issues surrounding mechanical and chemical compatibility.
Referred to as a third-generation fuel cell, the Postech team’s device boasts a simple structure and does not have any problems with corrosion of loss of the elctrolyte. It showed a peak power density of around 560 mW per cubic centimeter at 550° C (1,022° F) and maintained this power density during rapid thermal cycling. With this sort of power density and reliability, the team suggests the device may offer an alternative to lithium-ion batteries in a range of mobile electronics, such as smartphones and laptops. At just 78 mm2 per cell in size, the Postech device is also claimed to have fast on and off times similar to lithium-ion batteries and superior power densities that would allow smartphones that would only need to be charged once a week.
The Postech device generates power by converting hydrogen (in this case, “Wet” H2 gas comprising 97 percent H2 and 3 percent H2O mixture) supplied as fuel gas to the anode to create electricity. It does this through the use of a solid oxide material acting as the electrolyte that allows the conduction of negative oxygen ions from the cathode to the anode. These ions diffuse through the solid oxide electrolyte to the anode where they oxidize the fuel. This reaction produces electrons, which then flow through an external circuit to provide power.
Whilst the fuel cell is still in the prototype phase, the researchers believe that their research could result in the development of larger, less expensive (but with much higher-power density) fuel cells for use in vehicles in the not-too-distant future.
The results of this research were recently published were published in the journal Scientific Reports.
Source : http://www.gizmag.com
The iPhone 6s is among Apple’s fastest devices ever released. But if you’re pleased with the speed of Apple’s A9 chip, your iPhone can fake a speed increase that translates to real world results.
The glitch was found by 9to5Mac’s Jeff Benjamin. The iDownloadBlog alumni points out that, even without a jailbroken device, you can completely remove the animations from your device. Instead of tapping on an app and waiting for it to expand on screen, you’re taken right to the app—no waiting. Check Jeff’s video for details on how to reenact on your own iDevice.
Enacting the Assistive Touch accessibility feature allows you to begin removing animations from your iPhone. Once enabled, you’ll want to return to the homescreen and swipe down to access Spotlight search (what you use to search your entire device). If you swipe down and then up at the right moment, your iPhone will weirdly remove animations from your phone experience. As Jeff notes in the video, it doesn’t have to do with how fast or slow you go, just a matter of timing it right, similar to what we see in the video. Rebooting your phone resets the glitch and reenables animations. You can follow the steps once again to remove animations.
Jailbreak users have known of the perils of iOS animations for a while. Cydia tweaks like NoSlowAnimation and FakeClockUp have allowed jailbroken iPhone, iPad and iPod Touch users to shorten animations, remove them altogether or even lengthen them—should said iOS user be a masochist.
With the iOS glitch now widely known, there is a good chance that we could see a patch for the glitch in Apple’s release of iOS 9.3. Along with a potential fix for the newfound “error,” users can look forward to Night Shift. The feature made popular by f.lux allows the device to adjust colors at the end of the day to offer a warmer hue—providing colors presumably better for one’s sleep patterns.
Much like jailbreak users, Apple may patch this glorious use of a bug very soon. Until then, enjoy living life in the fast lane.
Source : http://www.popsci.com
The humanoid Atlas robot, which has been overhauled with a sleeker design, can be seen at the beginning of the video walking around untethered before it opens the front door to Boston Dynamics’ office and steps outside. The bot is then seen walking on uneven and snowy terrain, maneuvering around trees and correcting its balance several times. [Watch the Atlas Robot Video]
The new-and-improved robot is “designed to operate outdoors and inside buildings,” Boston Dynamics wrote in a description of the video posted on YouTube. “It is specialized for mobile manipulation. It is electrically powered and hydraulically actuated. It uses sensors in its body and legs to balance and LIDAR and stereo sensors in its head to avoid obstacles, assess the terrain, help with navigation and manipulate objects.”
Indeed, the video goes on to show Atlas bending down to pick up 10-pound (4.5 kilograms) boxes and pivoting its torso to place each package on a shelf. In another instance, a human handler uses a hockey stick to push Atlas off balance. The robot stumbles backwards (but catches itself) before regaining its balance. Next, an employee pushes Atlas down from behind. The curled-up robot (lying flat on its robotic face) is able to push itself up — first to its “hands” and “knees,” before righting its torso and then pushing up on its feet— all without help from a human or a tether. [Robots on the Run! 5 Bots That Can Really Move]
Some commenters on the YouTube video expressed outrage at the guy pushing the robot with a hockey stick, with some saying they felt sad for the robot, some calling the guy a bully and even suggesting, perhaps with a grin, that he will be blamed for any robot uprisings.
“The guy who kicks the robot will be fully responsible [sic] from the forthcoming robot-human wars,” wrote Alper ALT.
Another commenter, jonelolguy, wrote: “Man, i actually feel bad for the robot.”
“Did anyone else feel pretty sad when they pushed it,” wrote Cris Loreto.
These commenters aren’t alone in attributing feelings to robots, particularly ones that look lifelike.
Researchers have found that when people watch a robot being harmed or snuggled they react in a similar way to those actions being done to a flesh-and-blood human. In one study, participants said they felt negative emotions when they watched a human hit or drop a small dinosaur robot, and their skin conductance also showed they were distressed at the “bot abuse.” When volunteers watched a robot being hugged their brain activity was the same as when they watched human-human affection; even so, brain activity was stronger for human-human abuse versus human-robot violence.
“We think that, in general, the robot stimuli elicit the same emotional processing as the human stimuli,” said Astrid Rosenthal-von der Pütten of the University of Duisburg Essen in Germany, who led that study. The research was presented in 2013 at the International Communication Association Conference in London.
Last summer, Boston Dynamics upgraded the Atlas robot for the DARPA Robotics Challenge Finals, a competition hosted by the U.S. military’s Defense Advanced Research Projects Agency. The most significant changes at that time were to Atlas’ power supply and hydraulic pump, which helps the robot stand, walk around and perform other tasks.
Boston Dynamics, which is owned by Google, said the new version of the Atlas robot now stands about 5 feet and 9 inches (1.7 meters) tall, which is about a head shorter than the version of Atlas used in the DARPA Robotics Challenge Finals, and weighs 180 pounds (82 kg).
Source : http://www.livescience.com
Global Warming is one of the most adverse threats the Earth is facing today. It is taking its toll on the world through a whole lot of pollutants. It is high time we heed this alarming fact and take measures to battle the impending hazards.
With the globe becoming increasingly pollution-prone, all of us face the threat of a dark future devoid of the present beauties of the world. Globally, there is an alarming increase in environmental pollution. Considering the depletion of useful natural resources and the pollution of the environment, the predictions about the end of the Earth no more seem to be wild fantasies. In such a bleak scenario, only environment-friendly technologies can save us from environmental disasters.
Environmental Technologies are the only way to curb pollution and create a hazard-free environment. The main concept behind environmental technologies is to convert environmental beneficial material into value added products and services. The purpose of implementing environmental friendly technology is to minimise environmental pollution. Some of the beneficial factors are:
1. Minimum materials as input
2. High energy conservation.
3. Least pollution.
4. Minimum waste disposal.
5. Numerous valuable by-products are recovered.
Environmental Technology is the cleanest and most resource efficient technology. Corporations can gain competitive advantage using these technologies. Many companies utilise environmental technologies to produce common consumer products. Leading players like NTIC produces Polymer Energy with the help of environmental technology for economical and environmental gain. It is an alternative and effective method to recycle and dispose plastic wastes. The Polymer Energy system effectively converts plastics into crude oil with the use of catalytic pyrolysis. Every single ton of plastic waste is converted into 775 litres of crude oil.
Approximately 230 million tons of garbage is generated which is converted into Nature-Tec environmental friendly plastic. Bio-based or bio-degradable plastics are produced using environmental technology. These plastics are fully degradable and prevent the soil from getting polluted. Some of the useful applications of these plastics are carry-out bags, packaging films, trash bags. They can also be used as extrusion coat papers which are used in coated paper cups, trays and others.
NTIC is an extremely environment-friendly and eco-conscious organisation which has completely understood the concept of environmental technology. It is constantly striving to utilise environmental technology to its fullest extent and offer value-added products to consumers. NTIC stands in offering an environment-beneficial clean technology to the public.
Computer Aided Manufacturing (CAM) is one of the software automation processes that directly convert the product drawing or the object into the code design that enables the machine to manufacture the product. It is used in various machines like lathes and milling machines for the product manufacturing purposes. It allows the computer work instructions to communicate directly to the manufacturing machines.
The mechanism of CAM developed from the Computer Numerical Machines (CNC) in the early 1950s. These systems were directed by a set of coded instructions in a punched paper tape. The proposal to develop the first numerically controlled machine was commissioned to the Massachusetts Institute of Technology (MIT) from the US Air Force in the year 1949. The entire proposed idea of developing this machine was demonstrated in the year 1952.
The motivation factor in developing these kinds of numerically automated machines involves the expensive costs in manufacturing the complex curved geometries in 2D or 3D constraints mechanically. The development of these machines considers the factors like easier programming in CAM and easy storage of programs. A program can be changed easily and avoid manual errors. Numerically controlled machines are safer to operate, and the complex geometry comes at a reasonable price.
James T. Parsons proposed the concept of the numerical control operations during the year of 1948. In 1950, the MIT servo mechanism lab developed the Numerical Control (NC) milling project. The remaining program parts were released in the later period of 1952 along with the first successful demo version. After 1955, major companies in the industry developed their own machine designs.
IBMs Automatic Tool Changer in the year 1955, G & Ls first production of the skin-miller in the year 1957, and the machining center developed by K & T have all been considered to be major developments to promote the technology with more benefits. CAD drafting and the sculptured surfaces were developed in the year 1965; 7,700 NCs were also installed during the same year.
During the year 1967, the concept of developing the CNC machine was proposed. The existence and the major development of the CAD/CAM machines evolved during the year 1972. 3D CAM/CAD systems were introduced in 1976. Expert CAM/CAD systems were developed in the year 1989. The major development of the CAM systems provides you with easier manufacturing of objects with high efficiency.
2014 was heralded as the ‘year of the data breach’ – but we’d seen nothing yet. From unprecedented data theft to crippling hacktivism attacks and highly targeted state-sponsored hacks, 2015 has been the bleakest year yet for the cyber security of businesses and organisations.
High profile breaches at Ashley Madison, TalkTalk and JD Wetherspoons have brought the protection of personal and enterprise data into the public consciousness.
In the war against cybercrime, companies are facing off against ever more sophisticated and crafty approaches, while the customer data they hold grows in value, and those that fail to protect it find themselves increasingly in the media and legislative spotlight with nowhere to hide.
We asked a panel of leading industry experts to highlight the major themes for enterprise cyber security in 2016 and beyond.
The increasing sophistication of DDoS attacks
There were many cyber security stories this year that raised eyebrows, but the one that stands out for many reasons is the DDoS attack and subsequent data breach of 157,000 customer records from UK telecoms provider TalkTalk.
When TalkTalk became the victim of its third cyber attack in the space of a year, it turned out to be the biggest British cyber attack on record, costing the firm an estimated £35 million.
Dave Larson, COO of Corero Network Security, believes that DDoS being utilised as a smokescreen for more nefarious data exfiltration is emerging as a more common component of reported breach activity.
TalkTalk’s apparent lack of DDoS protection in an Internet Service Provider environment hasn’t gone unnoticed, and has raised red flags across the security community.
‘The ever-growing number of tools for automating DDoS attacks means that companies will have the threat of several different attacks happening at once, or in rapid succession,’ explains Larson. ‘If the hackers are able to automate some of their attack activities that were more labour-intensive, then companies will begin to be overwhelmed by both the speed and frequency of new attacks – unless they have the appropriate mitigation solutions in place.’
‘DDoS has evolved from your typical volumetric scale attack to smaller, short duration surgical strike attacks causing security vulnerabilities as well as availability concerns for organisations.’
Internet Service Providers (ISP’s) must reconsider the legacy approach to DDoS mitigation, and implement more sophisticated and granular protection at the Internet edge, says Larson.
‘Legacy scrubbing centre operations, or black holing victim IP’s as a response to DDoS attacks will become techniques of the past for dealing with this challenging cybersecurity issue.’
Social malware as the new wild west
Phishing isn’t going anywhere, but we can expect an increase in sophistication: fraudulent sites offering faux-customer support resulting in a remote connection compromising users’ systems – or attackers even venturing to social media outlets like SnapChat and Instagram to broaden their reach.
‘Over the last 15 years we’ve seen web attacks evolve to a highly sophisticated state, mobile applications are five years into this same cycle,’ says Ben Harknett, VP EMEA at RiskIQ. ‘But it doesn’t stop there, next to join the cyber-attack evolutionary path is social media attacks. Whilst still in the early stages, attacks like this have huge potential in online fraud as demonstrated by the Metro Bank Twitter incident earlier this year.’
‘With a predictable pattern for how attacks evolve, we fully expect 2016 will see rapidly increasing maturity in attack vectors involving social media. Brace yourselves, the impact of viral, social media delivered, malware will be huge.’
The threat still lurking within organisations’ walls
Many businesses are getting serious about cyber security and adopting fundamentally new approaches to deal with today’s complex threat landscape. As Dave Palmer, director of technology at Darktrace explains, at the core of this shift is an acknowledgement that threat is, by default, inside our organisations, and must be kept in check by continual monitoring and advanced detection.
‘Companies need to accept that new reality and surmount the old idea that all threats can be blocked at the perimeter,’ says Palmer. ‘Insider threat will loom large over organisations in 2016.
However strong your perimeter is, or how well your staff are trained, insiders will always pose a significant risk. They are potentially the most damaging types of threats, as they use legitimate credentials and exploit their access in ways that are difficult to predict.’
And as networks grow and more devices become interconnected, the pool of potential insiders is getting larger too, spanning from your own employees, through to customers, suppliers or contractors who have access to parts of the corporate network.
Social engineering is one of the main mechanisms used to gain unauthorised access to systems. Brian Chappell, director of technical services EMEAI and APAC at identity management firm BeyondTrust explains, people remain a weak-link but they could also be your strongest resource.
‘Most organisations rely wholly on technological solutions to secure their networks giving their employees cursory consideration with occasional communication around the risks that their actions have,’ says Chappell. ‘We don’t need to scare our staff but rather look to educate, frequently, what they can do to help mitigate those risks. Your employees could be the biggest resource you have to protect your systems.’
Behavioural analytics and machine learning coming to the fore
DarkTrace’s Palmer argues that the single most important innovation in the cyber defence sector has been the new capability of machines to automatically learn what is normal and abnormal within a network, and identify in-progress cyber-attacks without having previously seen them before.
‘The most successful companies in proactive security have embraced this model of ‘immune system’ technology that continually looks out for abnormalities, and alerts the security team in real time, before the damage has been done,’ he says.
‘Cyber security will move further towards the boardroom as a corporate issue, rather than a problem for the IT department, and become a continual process of risk mitigation.’
Automation will be critical to this process, and machine learning will become a de facto technological approach to draw insights from large sets of noisy data, quickly, predicts Palmer.
Jonathan Sander, VP product strategy at Lieberman Software thinks this year we will see a major revolution in how firewalls are installed, configured and run that deliver more value with less human tuning.
‘Part of what takes humans out of the firewall tuning business will be collective experience being put in the box,’ says Sander. ‘Some of it will be the application of machine learning technologies and other nascent AI peeking out of the lab and impacting security operations. We know that the bad guys are using automated techniques to attack, and it’s only by putting our machines to fight theirs on the front line that we can hope to keep up.’
The CSO role getting a rethink
We’re seeing a growing number of CSO (Chief Security Officer) and CISO (Chief Information Security Officer) roles as a reaction to the current cyber security environment.
‘Every large company thinks they need to hire one, but often neither the business nor the CSO understand what their role should be, to whom they should report, or even what their performance or success should look like,’ says one CSO- Dave Baker from identity and device management firm Okta. ‘I have seen many cases where the CSO was recruited from the compliance world with little understanding of actual attack security. This seriously diminishes their effectiveness.’
As the white hat hacker community grows and enters the enterprise, Baker predicts the CSO role will see a much-needed evolution.
‘Hackers who understand technical details of attack security, but also have the business acumen to communicate with CEOs and convince CIOs of their importance will make a significant impact on the role of security professionals,’ says Baker.
‘Chris Wysopal, CTO of Veracode, as well as Alex Stamos, CSO of Facebook, are popular examples of a hacker-turned-executive – we’ll see more like them in coming years.’
Ransomware turns on the enterprise
As Michael Sutton, CISO at Security as Service platform Zscaler explains, Ransomware has hit a sweet spot.
‘Users are all too willing to begrudgingly pay an expensive but not excessive ransom in exchange for the return of their precious data,’ Sutton says. ‘Even the FBI are recommending that it’s easier to pay than fight. The wildly profitable CryptoLocker has attracted many clones since it was largely knocked offline following Operation Tovar.’
Many of these clones, including more popular variants such as CryptoWall and TorrentLocker largely followed the proven formula, but we’re starting to see variations such as mobile and Linux focused ransomware.
‘The latter is especially important as it’s more likely to impact the websites and code repositories of enterprises, who in our experience are also very willing to pay up rather than risk losing critical intellectual property,’ says Sutton.
‘Expect ransomware to become increasingly corporate focused in 2016 and as it does, enterprises won’t get away with paying consumer rates. The criminals behind the ransomware campaigns are savvy and once they realise that they’ve locked up source code and financial documents that haven’t been properly backed up, you can expect prices to skyrocket … and be paid.’
Source : http://www.information-age.com