Microsoft Visual Studio 2015 Coming on July 20, Save the Date

Microsoft Visual Studio 2015 Coming on July 20, Save the Date

Microsoft Visual Studio

Microsoft announced the much awaited Visual Studio 2015 release yesterday. The final build will be available for download on July 20. Microsoft had released the preview versions of Visual Studio 2015, .NET 2015, and various other developer tools in November, last year.

Visual Studio 2015 will have two subscriber options; Enterprise and Pro.  Microsoft is holding a Visual Final 2015 release event on July 20 at 8:30 a.m where the freelance developers would have the opportunity to have a Q&A session with the team of Microsoft.


New tools for Windows Presentation Foundation development,  like diagnostic tool, debugging tools and various other features to make it  easy and exciting for the Android developers.

The date of launch by Microsoft doesn’t come as a surprise as Windows 10 will be launched on July 29, a week after the Visual Studio 2015.

Do you have an opinion on Microsoft’s Visual Studio?? Tell us in comments below.

Recommended: Docker, Google, CoreOS, Microsoft, IBM, Linux and More Working On Common Container Standard

The post Microsoft Visual Studio 2015 Coming on July 20, Save the Date appeared first on fossBytes.


Circle City Con 2015 – Deploying Honeypots To Gather Actionable Threat Intelligence

Circle City Con 2015 – Deploying Honeypots To Gather Actionable Threat Intelligence

Threat Intelligence seems to be all the rage. There are tons of security vendors selling threat intelligence and products to support data collection and analysis, but what about localized actionable intelligence? This analysis will revisit the implementation of high-interaction honeypots in a production setting and how (iff properly deployed) this data can be used to respond to incoming threats as they arise. This talk will discuss the do?s and don?ts of integrating honeypots into your environment and how to obtain critical (actionable) insight from honeypot activity using open source tools. Bio: James Taliento is a Security Researcher primarily focused on security efficacy (a fancy word for offensive security research). As the founder of and Chief Research Officer at Cynical Security he spends most of his time overtaking networks and analyzing attack data. He?s consulted with Fortune 100?s in a variety of industries, and thoroughly enjoys designing creative ways to use honeypots. When James isn?t damaging his eyesight by staring at his laptop for hours on end, he could be found enjoying a good beer, engaging in some nonsensical DIY project, or laughing at inappropriate things on the internet. For More Information Please Visit: –



Táticas que hackers usam para invadir uma empresa

Táticas que hackers usam para invadir uma empresa
Cibercriminosos se valem de ferramentas para testes de penetração em seus ataques. Listamos seis formas comuns de invasão

RSS Tema

Researchers Hack Into Rats’ Brains, Dream of Better Future Just Like Us

Researchers Hack Into Rats’ Brains, Dream of Better Future Just Like Us

dreaming rats

You thought humans are the only species that can make plans and dream of a better future!!! Guess what, You are wrong.

According to a new research, when rats sleep, their brain simulate journeys to a desired future such as a tasty treat creating fragments of future that they wish could come to reality.

The research at University College London explains that it is due to hippocampus, a part of the brain that helps us to imagine the future. When mammals move in the environment they find suitable, they immediately form a map inside their brain.

Senior scientist Hugo Spiers explains:

During sleep or rest, the hippocampus replays journeys through this map which may help strengthen the memory. It has been speculated that such replay might form the content of dreams.

The researchers monitored brain activity in rats whilst keeping them in different environments. First teasing them with the food they cannot get, then while they were asleep and last when they were allowed to get to the food.

The results were astounding; the brain cells that are involved in navigation showed that the brain activity during rest was similar to when they were kept away from the food. Meaning, they had been dreaming and recreating the situation in their brain.

Spies added:

Because the rat and human hippocampus are similar, this may explain why patients with damage to their hippocampus struggle to imagine future events.

The results are very useful as they explain why some people are unable to imagine the future.

Did you find the post interesting?? Let us know in comments below.


The post Researchers Hack Into Rats’ Brains, Dream of Better Future Just Like Us appeared first on fossBytes.


NSA grampeou dois ministros das Finanças da França, diz WikiLeaks

NSA grampeou dois ministros das Finanças da França, diz WikiLeaks

A Agência de Segurança Nacional (NSA, na sigla em inglês) dos Estados Unidos grampeou as comunicações de dois ministros das Finanças da França e coletou informações sobre contratos franceses de exportações, comércio e negociações orçamentárias, de acordo com o WikiLeaks.

O website, conhecido por vazamentos de documentos sigilosos, disse que os ministros foram François Baroin e Pierre Moscovici, que chefiaram o Ministério das Finanças da França de 2011 a 2014.

As alegações, publicadas conjuntamente com o jornal Libéracion e com o site Mediapart, acontecem uma semana após o WikiLeaks ter relatado que a NSA havia espionado três presidentes franceses desde pelo menos 2006 até maio de 2012, levando o governo a condenar Washington, alegando que tal comportamento entre aliados é inaceitável. 

O WikiLeaks disse que, em um documento datado de 2002 e renovado em 2012, a NSA pediu para que serviços de inteligência da Austrália, do Reino Unido, do Canadá e da Nova Zelândia coletassem informação sobre contratos franceses de exportação no valor de mais de 200 milhões de dólares, em setores como telecomunicação, eletricidade, energia nuclear, transporte e saúde.

Nenhuma companhia específica foi nomeada nos documentos do WikiLeaks. 

(Por Leila Abboud e Gregory Blanchier)


Plantão – Segurança – INFO

Circle City Con 2015 – Reducing Your Organization’s Social Engineering Attack Surface

Circle City Con 2015 – Reducing Your Organization’s Social Engineering Attack Surface

his case study is a journey through the presenter’s experience compromising Fortune-50 companies at the DefCon 21 and 22 Social Engineering Capture the Flag (SECTF) competition and other smaller targets on more recent consulting engagements. The DefCon SECTF participants competed to gather openly available information on their corporate targets both on the Internet and over the phone. Some companies put up better defenses than others. Social engineering remains a threat to companies of all sizes and industries. Verizon?s 2013 Data Breach Investigations Report cites that 29% of breaches investigated had a social engineering component. Social engineers manipulate human beings to get them to reveal information or take a particular action, such as clicking a malicious link. Information gained via social engineering is then used to gain access to information systems or sensitive data. Attendees will learn the factors that contributed to the presenter’s success and how simple changes could have frustrated her intelligence gathering operations. Session participants will also learn how to detect social engineering attacks and react to them appropriately. And yes, there will be pwnage. Takeaways: Understanding of the social engineering process; Actionable tips that can be used in any company. Bio: Jen Fox, CIPT, is a Sr. Security Consultant and governance Practice Lead at VioPoint. Her 20+ years in IT and information security includes training, usability design, business process analysis, risk management, vendor risk management, and security awareness. Specialties include information elicitation and business/technology translation. She is also a locksport enthusiast and Myers-Briggs nerd. For More Information Please Visit: –



New Space Shuttle exhibit offers first public display of Columbia, Challenger artifacts and debris

New Space Shuttle exhibit offers first public display of Columbia, Challenger artifacts and debris

NASA is displaying artifacts and debris from both Columbia and Challenger. In some cases, these artifacts have never before been seen in public.

ExtremeTech » News & Updates For Hardcore Tech Fans | ExtremeTech

D-Wave Quantum Computer Breaks 1000 Qubit Barrier

D-Wave Quantum Computer Breaks 1000 Qubit Barrier

D-Wave quantum computers

The world is growing with ever-advancing technology. Not far ago we heard of Supercomputer Tianhe-2 blazing at 33.4 petaflops. This time it is a Quantum computer.

D-Wave Systems Inc, the world’s first quantum computing company has recently announced that it has broken 1000 qubit barrier. A qubit is a two-state quantum-mechanical system, such as the polarization of a single photon. The two states are vertical polarization and horizontal polarization.

The new D-Wave computer has a processor of double the size of their previous model and has achieved the highest number of qubits ever. It runs a quantum annealing algorithm to find the lowest points, corresponding to optimal or near optimal solutions, in a virtual “energy landscape”. The qubits represent the search space of the processor. For eg: x qubits mean it will search for 2^x possibilities.

That means at 1000 qubits, the new processor considers 21000possibilities simultaneously and has a search space which dwarfs the 2512 possibilities available to the 512-qubit D-Wave Two. ‪In fact, the new search space contains far more possibilities than there are ‪particles in the observable universe.

The new processors inside D-Wave quantum computer are considered to be the most complex superconductor integrated circuits ever built.

Quantum computers’ computational prowess depends on the operating temperature, noise and the circuitry precision. The factors that impact problem solving of the processors’ efficiency are:

1. Lower Operating Temperature: Lower operating temperature increases the accuracy of the system. Previous generation processor ran at temperature close to absolute zero, the new processor runs 40% colder.

2. Reduced Noise: The new computer has the noise levels reduced by 50% in comparison to the previous generation. Lower noise boosts reliability and stability.

3. Increased Control Circuitry Precision: The increased precision coupled with the noise reduction has demonstrated improved precision by up to 40%..

4. Advanced Fabrication: The new processors comprise over 128,000 Josephson junctions (tunnel junctions with superconducting electrodes) in a 6-metal layer planar process with 0.25μm features.

The new and improved D-Wave Quantum Computers promise to solve some of the most challenging  scientific and national defense problems.

Also Read : IBM’s One Step Towards Making Quantum Computing A Reality

Did You find the post informative? Let us know in comments below.

source: D-Wave Systems

The post D-Wave Quantum Computer Breaks 1000 Qubit Barrier appeared first on fossBytes.