Malware in ads causes trouble for millions of people. But ad publishers still fight against ad blocking

A very careful user - in a gas mask.

Maybe you know a person like this. He or she will adamantly claim that they have never been to any suspicious or dangerous websites, have never opened an email attachment as long as they live and have never downloaded anything.

And yet they have a computer haunted by malware.

However, the time has come for exactly this to be possible. Even people who try to surf the net responsibly and safely can have their computers infected by a nasty malware.

Because of ads that spew the malicious code around.

Continue reading

Hackers are learning from mafia. They extort a “protection” fee under a threat of DDoS attacks

A picture of a mafioso sitting behind a table, using his phone to extort someone.

“What a lovely thing, that company network of yours, with all its servers and websites. It would be a shame if anything were to happen to it…”

Acting like old-school mafia, a group of hackers calling itself the Armada Collective started to extort money from companies.

They rattle their sabres and threaten companies with a massive DDoS attack, unless the firms in question pay a hefty sum in bitcoin.

Situations like these happen quite frequently. However, this particular case is unique – in the end, the Armada Collective doesn’t attack at all. All those threats turn out to be empty.

Even so, the “hackers” racked up a lot hundreds of thousands of dollars from many companies.

Continue reading

Watch out for security cameras, warn experts. Research found holes in security

Security cameras. Experts think they are not secure at all.

Experts on internet security had some suspicions, so they put them to the test. They thought that security cameras might be actually inviting hackers into networks of companies they tried to protect. But how many attackers would actually employ these when searching for a way in?

They did a practical test. Five routers, DVR systems and IP cameras were set up and connected to the internet. Every device was fully patched and ran on default settings.

How did they fare in the test?

Continue reading

Scientists built a new quantum computer. It’s made of five atoms and “self-destroys” after each use

A vizualization of a molecule. Scientists managed another breakthrough. Their new quantum computer can do lightning-fast calculations despite consisting of only five atoms.

Experts on quantum computing have broken through another barrier on the way to quantum computers we could actually use.

A team of scientists from Innsbruck university and MIT managed to build a functional quantum computer that is the first to successfully scale the famous Shor algorithm for quantum computers.

Their newest pride and joy is only five atoms large and needs to be rebuilt after every use. However, the scientists claim that it is easily scalable – so an effort to build a larger and more complex quantum computer is no longer a question of taming the physics, but of a budget.

Continue reading

The fastest computer in Europe will get a sizeable upgrade: 4500 new GPUs and faster CPUs to boot

A photo of the Piz Daint supercomputer at the swiss supercomputing center CSCS. It will soon get even faster. Photo copyright: CSCS.

The fastest computer on the old continent can look forward to getting a huge present.

The Piz Daint supercomputer at the Swiss National Supercomputing Center (better known under its Italian acronym CSCS) will get a proper upgrade.

What will the experts at CSCS change under the hood?

Continue reading

SSL certificates explained: What SSL is, how it works and why you should use it as well

“We want a safer internet!” think lots of people all over the world.

And experts are working on just this day and night. However, results of their hard work are often so difficult to understand that only security experts themselves know what has been accomplished.

This is the case with SSL certificates. While IT experts know what SSL is, how it helps with securing the internet and all that jazz, most people have only partial – and often wrong – information. And although news outlets try, they only succeed in passing on very basic information – like “check if your browser says HTTPS and look for a lock icon, then you’re safe” kind of thing.

But there’s more to it than that.

Because SSL certificates are a complex and powerful system that makes the internet safer.

Continue reading

Moore’s law grew the IT business for 51 years. But today’s anniversary might be its last

Fifty-one years ago to the day, the director of Fairchild Semiconductors’ R&D laboratories wrote an interesting paper.

He described the evolution of computer chips since the 1950s.

In a short text – mere three and a half pages long – he described his findings. He noticed that the transistor count of reasonably priced circuits is growing at a quick pace. The chart of transistor count growth for the last few years was practically a steady upwards line. The complexity of similarly priced circuits almost doubled every year.

As a proper scientist, the director thought ahead. What could this mean for the future? “Over the longer term, the rate of increase is a bit more uncertain, although there is no reason to believe it will not remain nearly constant for at least 10 years,” the thirty-six years old researcher wrote.

His name was Gordon Earle Moore and he just gave the world his “law” that dictated the pace of the whole IT industry for over half a century.

Continue reading

Dell brought out a honey-filled trap for hackers. It lures them with fake credentials

A hacker combing through a company network stumbles on a lucky find – the memory of one of the servers holds login credentials of an administrator.

And already he’s made a mistake. The trap has sprung.

The hacker tried to take hold of fake credentials that were intentionally left there by the server’s defenders. They will help them to better monitor and identify further attacks.

That’s how a new tool called DCEPT made by Dell’s experts should work. It should make life easier for admins and more difficult for hackers. And best of all, the DCEPT is free and open source.

Continue reading

MouseJack: Security experts found a way to hack any computer through its mouse

There’s a new way for hackers to get control over a computer and it’s surprisingly simple.

They can just take control of their target’s mouse.

Security experts found a fault that allows a hacker to hijack a computer through a wireless mouse of their victim with just a cheap USB dongle and few lines of code in Python.

They dubbed the attack MouseJack and consider it a real threat for individuals and companies alike.

Continue reading

Scientists created a new type of CPU that communicates using light instead of electrons

Unexpected miracle.

This nickname and many like it have been quickly ascribed to a new kind of CPU that has been created by a group of scientists from three US universities.

Their research published by Nature came out unexpectedly. Even though it promises huge changes in the future development of processors.

What is it all about, then? It’s a CPU that uses both photons and electrons, amazingly fast when moving data around, and it’s been built the same way that current chips are.

Continue reading

Catch old viruses: The Internet Archive adds a museum of DOS malware

Would you like to try out a virus?

You probably don't hear an offer like this a lot. But now it's time to seriously think about it - as a newly established Malware museum offers just that. It's a collection of old viruses, worms and other malicious software hailing from the long-passed ages of DOS and it allows visitors to experience their effect firsthand, right in the browser.

But there's no need to be afraid of potential data loss or system corruption. Every bit of malicious code has been cut out from the malware, so you can experience its behaviour without destructive consequences.

Continue reading

How to Build a Company Data Center: Part Three

In the previous article of this series, we furnished a data center with network technologies. But now the tech and fancy double floor is just collecting dust. How can we breathe life into the data center, make it host our company apps and thus fulfilling its purpose?

This third and final part of the How to build a data center series will go through the tpics of virtualization, cloud and the mantra of high availability. Until now, we have invested a lot of money into building a data center, but there’s still one definitely large expense waiting for us – the disk array.

Continue reading

How to Build a Company Data Center: Part Two

This is a second part of our series about building your own data center. It picks up where we left off last time as we look at choosing the right hardware, ensuring high availability of all parts of the infrastructure and connecting all of the components into a modern computer network.

Last time we focused on choosing the right location for the data center and talked about basic power supply and cooling considerations, physical security and dual connectivity. We’re on the right track, but there’s still a long way to go till we reach a working infrastructure. Let’s go.

Continue reading

How to Build a Company Data Center? Part One

This article is a first in a series about building and managing a modern data center. Have you decided to build a brand new data center to meet your company’s needs? Then you have surely though about what type of a data center you’re going to build, how much technology is going to be inside it and at what temperature will these machines operate. However before all that, an absolutely key factor is just choosing the right place. The companies that chose to put all their data in Karlin-Prague – a district of Prague devastated by 2002 flooding – would now surely agree.

Continue reading

How does a CPU work? Look at transistors moving data in the first ever ARM processor

They are a heart of every personal computer, server, tablet or a smartphone. Technological marvels that even most IT professionals understand only in a very general way.

The CPUs.

Do you think that understanding the details of CPU architecture is a thing best left to the experts? Everyone can try to reach them now. It was never easier to get a glimpse into how exactly do CPUs really work.

A small group of volunteers calling themselves Visual6502 have built a virtual model of the old ARM1 CPU. The model is fully functional.

You can see how the tiniest parts of the CPU work and communicate together as they’re going through code right in your browser window. You get to see what exactly the CPU’s innards do when they run through low-level commands like CMP or MOV.

The ARM1 was chosen because it has a well-deserved place in the history of computing. It was the precursor of modern ARM architectures that are ruling the today’s mobile CPU landscape.

The virtual model of the CPU was also a birthday present for the ARM’s eponymous manufacturer. The ARM company has recently celebrated its 25th birthday.

Continue reading

He built our Prague data center from scratch. Now Petr Stepanek is its boss

He is in charge of everyday operation of the data center, taking care of customers and always thinking of innovation. Petr Stepanek is the company CFO and the director of Master DC Prague and he’s been with us since the beginnings. Ten years on, he still enjoys working here. Read on to meet one of our important people.

Continue reading

Neogenia: The cloud is amazing. We’re always trying to come up with yet another use for it

Neogenia, a successful young company from Brno, Czech Republic, has been excelling in the field of marketing for five years. They’re innovators who try to push the boundaries of their industry through modern technologies. Recently, they have got a new private cloud by Master DC.

What do they like about it the most, how did the migration to private cloud go and what are their future plans? Here are their answers, courtesy of Neogenia’s CTO, Jan Simecky.

Continue reading

Explained: How OpenStack works and six reasons you should have a cloud on this platform

There are many open source projects in the IT world, and others are cropping up daily.

Just a few of them make it up to the level where even multinational corps and companies begin to respect them.

The obvious example is Linux. It grew up from a one-person’s project to be an operating system used by a huge number of experts, companies and laymen alike. Relatively recently, even the experts from a rival company Microsoft started using Linux for some specific tasks.

Now the story seems to be similar for OpenStack, a cloud platform that is used to run more and more computer clouds all over the world. Big companies the likes of Intel or PayPal have adopted it and other corporations follow suit. Some people are already referring to OpenStack as the “king of cloud”.

So what’s the hype all about? How does OpenStack work? And what are its benefits for companies who want to use the cloud?

Continue reading

Don’t Get Swept Away: The Most Common DDoS Attacks are SYN and UDP Floods

The calm week of Adrian Newby, CTO, was about to change. His company provides internet-based software-as-a-service to its clients. One of those clients was now in trouble.

Their servers have started acting up.

They were receiving huge amounts of internet traffic they just could not cope with.

The symptoms were there. Newby knew that this were the beginning of a DDoS attack. A synchronized distributed effort trying to deny clients access to their services.

How did he face the challenge?

Continue reading

Stories of Evil Administrators: How to Avoid Losing Millions

Walter Powell lost his job that day.

After years of being an IT manager for a company helping drug addicts in Baltimore, his boss sacked him.

Powell decided to go out with a bang.

He used his technical skills and remotely uploaded a keylogging software onto the computers of his former employer, Baltimore Substance Abuse Systems. This soon got him employee passwords – including the login information of the company director who was responsible for Powell’s sacking.

The following month was chock-full of interesting events for BSAS.

Continue reading

Don’t Get Lost in the Clouds: Nine Questions to Ask When Choosing a Cloud Provider

I wish I thought of that five minutes ago.

Everyone knows this feeling. The best questions and answers often come to us too late, even hours or days later than when we needed. Sometimes a neighbour has such a stupid question that a brief, coherent and concise answer is hard to come by. Other times you get so stressed by an unfriendly atmosphere and long lines at a local bank that you forget some of the questions you wanted to ask.

In everyday situations, it’s okay to not say or ask the right things. You can always explain your point to your neighbour later or call the bank for further information. When you are making important decisions however, it’s better to be prepared.

One of the most important decisions businesses can make these days is the one about adopting the cloud. When negotiating about this relatively new technology, it’s possible to talk about many factors. Here are nine important questions you should ask when choosing a cloud provider, so that you don’t get lost in the cloud.

Remember: it’s important to be ready.

Continue reading

How to Improve Security? Three Ways You Can Learn to Think Like a Hacker

Hacking is bad.

This idea is deeply rooted among a lot of people. And many journalists only seem to make this notion stronger.

But it is, in fact, false. Hacking – in and of itself – is not bad. And people using it are not all criminals. In this aspect, hacking is similar to lock picking – the ability itself is not harmful and in the hands of a locksmith or a firefighter saving people from fire in a locked apartment, it’s actually very helpful. Only in the wrong hands can this ability do harm.

Hacking is just a tool; a skill that can be used ethically. And there are hundreds of people in the world doing just that, every day. Thanks to hacking, they can reveal security holes and vulnerabilities of various applications, they document them thoroughly and then pass them on to the app’s developers. In short, they help to improve the world of cyber security. Almost every university in the world has its own team of such specialists.

Continue reading

Disasters could take down half of data centers worldwide. There’s a way to protect the data

The flood has gotten everywhere. Both the ground floor and the basement with the generators’ fuel were under water. It was a disaster. “We really didn’t expect the storm to have a significant effect on the data center,” Peer 1’s vice president Ryan Murphey recounted a year later. His company had not prepared for the hurricane Sandy that was about to hit New York. Only two employees were left in the data center at the time. He added: “At the worst, we thought the facility might lose utility power, and Jeff and Mike would need to switch to the building’s backup generators.”

Their servers, located in the building’s second floor, survived the storm intact.

However, the water flooded the underground, where fuel reserves were located. As well as pumps that were to carry that fuel up to the generators on the seventeenth floor. The storm disrupted not only the power coming from the grid, but also the datacenter’s backup system.

The generators were okay, but they were running out of fuel fast. Their fuel consumption was too high to be covered just by a small backup fuel tank on the generators’ floor.

The disaster created one of the most engaging data center stories of the recent past.

Continue reading

Shadow IT: When Users Want to Make IT Decisions

Be it work, sport or games, a lot of people have a competitive streak that drives them towards better results, again and again. Especially at work, there are many reasons to strive for success. Respect of bosses and co-workers, pay rise, promotion or a prospect of a better job, all those things drive us towards doing the best we can.

But what if there are artificial obstacles to productivity?

That’s exactly the problem many employees all over the world face daily. They strive for better results, effectivity or just user comfort, but are held back by company IT and their rules.

Even when employees feel that a particular application could make their job much easier, they can’t use it on company’s equipment. The installation is blocked by their limited user rights – which pushes a lot of people to trying to circumvent them. This is what experts call shadow IT.

Continue reading

Are SSDs suitable for servers? A Comparison of Pros and Cons of SSD and HDD, part two

The new way to store data called solid-state drive or SSD has a lot going for it. It’s faster, lighter and more resistant to elements. Is it more suitable for server use than regular HDDs, though? That is the question we are trying to settle in this two episode comparison series. This one will see us go through prices, energy requirements and future outlooks of both technologies. You can read the first part of this comparison here.

Continue reading

There Is Less Email Spam Around. Scammers are Moving to Social Networks

I am a Nigerian prince and I need your bank account number and your PIN. Earn ten thousand dollars per hour. Or just in short: ‘Cheap Viagra’. Messages like these arrive in ever smaller numbers these days. And that’s great. Spam has tricked a lot of people in the past, but that’s going to end eventually. Because criminals are shifting away from email spam and spam statistics are on the decline.

Continue reading

Are SSDs suitable for servers? A Comparison of Pros and Cons of SSD and HDD, part one

Disks with magnetic plates are done for. They are slow, they don’t take abuse well and their repair is half witchcraft, half alchemy – what other computer component can be fixed by baking it in the oven just as well as stashing it in the freezer? We should really get rid of them.

In all possible use scenarios, they are to be superseded by a new technology called solid state drive or SSD, that is much faster, newer, better.

But isn’t that just a marketing ploy to sell a new tech?

Read the first part of our comparison of pros and cons of SSDs and classic hard drives. In this post, we’ll introduce the new contender and look at two particular aspects – speed and capacity.

Continue reading

DDoS attacks are stronger and more frequent than ever. Admins must protect their servers

The internet gets a bit more dangerous every day, it seems.

Several unrelated investigations from different security companies all bring very similar results. Lately there has been an increase of distributed denial of service (also known as DDoS) attacks, through which culprits attack servers and make them inaccessible to regular users.

Servers and other network elements get overwhelmed by an incredible amount of requests that can slow them down or even push them over the edge and crash their network completely. And in the case of a distributed attack these requests come from all over the internet and have different information attached to them, making it very difficult to tell them apart from regular users’ requests. Though their requests might not even reach the servers – DDoS attacks can ‘block the pipes’.

Fighting against DDoS is not easy.

Criminals know this, and tend to use them ever more frequently these days.

Continue reading

Five Fears That Keep Some Companies Away From the Cloud (And How to Get Over Them)

We are all afraid of something.

We fear that something might happen to our loved ones or that we won’t have enough money, some people are afraid of clowns or even just darkness. Fear can be a helpful ally when dealing with everyday situations.

But we should not listen to fear when deciding the adoption of a new technology that could greatly boost our business.

A lot of people are still quite cautious of cloud computing. They hear others talk about it and praise it, see them use it. But they still don’t want to take the leap themselves. And maybe they’re right, the cloud might not be the optimal solution for every business. It depends on the circumstances. But for most companies the cloud can and will be helpful, it will increase their effectivity and save them time and money. However, it’s quite normal to be a bit wary of something new. If you are still somewhat unsure about the cloud, here is a list of five most common fears of the cloud and how to get over them.

Continue reading

What is Cloud Elasticity and How Does it Save Your Business Money

“You will save money.”

This sentence seems to be said in every list of advantages of the cloud. The shift away from physical servers and into the cloud brings a lot to the table, but money saved is the most important aspect for a lot of people.

But how exactly does it save you money? It’s mainly thanks to one factor – elasticity. Let’s look at what it actually is and how can it help you save money.

Continue reading

How Data Center Free Cooling Works and Why it is Brilliant

The best things in life are free.

A lot of the important stuff, however, is not. And it’s all the more painful when we realize we’re paying for something we could have gotten for free.

The free cooling of data centers is practically free. And paying for a standard compressor-based cooling seems really unnecessary in comparison. But let’s take it from the top:

Cooling is key. Without it, IBM data centers in north Italy would be as hot as pizza ovens in the company cafeteria. But how can you keep the servers from burning and not bankrupt your company in the process? With a technology called free cooling.

Continue reading

The right place for your data