Microsoft Visual Studio 2015 Coming on July 20, Save the Date

Microsoft Visual Studio 2015 Coming on July 20, Save the Date

Microsoft Visual Studio

Microsoft announced the much awaited Visual Studio 2015 release yesterday. The final build will be available for download on July 20. Microsoft had released the preview versions of Visual Studio 2015, .NET 2015, and various other developer tools in November, last year.

Visual Studio 2015 will have two subscriber options; Enterprise and Pro.  Microsoft is holding a Visual Final 2015 release event on July 20 at 8:30 a.m where the freelance developers would have the opportunity to have a Q&A session with the team of Microsoft.

visual-studio

New tools for Windows Presentation Foundation development,  like diagnostic tool, debugging tools and various other features to make it  easy and exciting for the Android developers.

The date of launch by Microsoft doesn’t come as a surprise as Windows 10 will be launched on July 29, a week after the Visual Studio 2015.

Do you have an opinion on Microsoft’s Visual Studio?? Tell us in comments below.

Recommended: Docker, Google, CoreOS, Microsoft, IBM, Linux and More Working On Common Container Standard

The post Microsoft Visual Studio 2015 Coming on July 20, Save the Date appeared first on fossBytes.

fossBytes
http://fossbytes.com/microsoft-visual-studio-2015-coming-on-july-20-save-the-date/

Circle City Con 2015 – Deploying Honeypots To Gather Actionable Threat Intelligence

Circle City Con 2015 – Deploying Honeypots To Gather Actionable Threat Intelligence

Threat Intelligence seems to be all the rage. There are tons of security vendors selling threat intelligence and products to support data collection and analysis, but what about localized actionable intelligence? This analysis will revisit the implementation of high-interaction honeypots in a production setting and how (iff properly deployed) this data can be used to respond to incoming threats as they arise. This talk will discuss the do?s and don?ts of integrating honeypots into your environment and how to obtain critical (actionable) insight from honeypot activity using open source tools. Bio: James Taliento is a Security Researcher primarily focused on security efficacy (a fancy word for offensive security research). As the founder of and Chief Research Officer at Cynical Security he spends most of his time overtaking networks and analyzing attack data. He?s consulted with Fortune 100?s in a variety of industries, and thoroughly enjoys designing creative ways to use honeypots. When James isn?t damaging his eyesight by staring at his laptop for hours on end, he could be found enjoying a good beer, engaging in some nonsensical DIY project, or laughing at inappropriate things on the internet. For More Information Please Visit: – http://circlecitycon.com/ http://www.irongeek.com/i.php?page=videos/circlecitycon2015/mainlist

securitytube

SecurityTube.Net
http://feedproxy.google.com/~r/SecurityTube/~3/PTdE4BysSFo/13420

Táticas que hackers usam para invadir uma empresa

Táticas que hackers usam para invadir uma empresa

http://computerworld.com.br/sites/beta.computerworld.com.br/files/news_articles/invasao.jpg
Cibercriminosos se valem de ferramentas para testes de penetração em seus ataques. Listamos seis formas comuns de invasão

RSS Tema
http://computerworld.com.br/taticas-que-hackers-usam-para-invadir-uma-empresa

Researchers Hack Into Rats’ Brains, Dream of Better Future Just Like Us

Researchers Hack Into Rats’ Brains, Dream of Better Future Just Like Us

dreaming rats

You thought humans are the only species that can make plans and dream of a better future!!! Guess what, You are wrong.

According to a new research, when rats sleep, their brain simulate journeys to a desired future such as a tasty treat creating fragments of future that they wish could come to reality.

The research at University College London explains that it is due to hippocampus, a part of the brain that helps us to imagine the future. When mammals move in the environment they find suitable, they immediately form a map inside their brain.

Senior scientist Hugo Spiers explains:

During sleep or rest, the hippocampus replays journeys through this map which may help strengthen the memory. It has been speculated that such replay might form the content of dreams.

The researchers monitored brain activity in rats whilst keeping them in different environments. First teasing them with the food they cannot get, then while they were asleep and last when they were allowed to get to the food.

The results were astounding; the brain cells that are involved in navigation showed that the brain activity during rest was similar to when they were kept away from the food. Meaning, they had been dreaming and recreating the situation in their brain.

Spies added:

Because the rat and human hippocampus are similar, this may explain why patients with damage to their hippocampus struggle to imagine future events.

The results are very useful as they explain why some people are unable to imagine the future.

Did you find the post interesting?? Let us know in comments below.

Source: ucl.ac.uk

The post Researchers Hack Into Rats’ Brains, Dream of Better Future Just Like Us appeared first on fossBytes.

fossBytes
http://fossbytes.com/rats-too-dream-of-a-brighter-future-just-like-humans/

NSA grampeou dois ministros das Finanças da França, diz WikiLeaks

NSA grampeou dois ministros das Finanças da França, diz WikiLeaks

A Agência de Segurança Nacional (NSA, na sigla em inglês) dos Estados Unidos grampeou as comunicações de dois ministros das Finanças da França e coletou informações sobre contratos franceses de exportações, comércio e negociações orçamentárias, de acordo com o WikiLeaks.

O website, conhecido por vazamentos de documentos sigilosos, disse que os ministros foram François Baroin e Pierre Moscovici, que chefiaram o Ministério das Finanças da França de 2011 a 2014.

As alegações, publicadas conjuntamente com o jornal Libéracion e com o site Mediapart, acontecem uma semana após o WikiLeaks ter relatado que a NSA havia espionado três presidentes franceses desde pelo menos 2006 até maio de 2012, levando o governo a condenar Washington, alegando que tal comportamento entre aliados é inaceitável. 

O WikiLeaks disse que, em um documento datado de 2002 e renovado em 2012, a NSA pediu para que serviços de inteligência da Austrália, do Reino Unido, do Canadá e da Nova Zelândia coletassem informação sobre contratos franceses de exportação no valor de mais de 200 milhões de dólares, em setores como telecomunicação, eletricidade, energia nuclear, transporte e saúde.

Nenhuma companhia específica foi nomeada nos documentos do WikiLeaks. 

(Por Leila Abboud e Gregory Blanchier)

 

Plantão – Segurança – INFO

Circle City Con 2015 – Reducing Your Organization’s Social Engineering Attack Surface

Circle City Con 2015 – Reducing Your Organization’s Social Engineering Attack Surface

his case study is a journey through the presenter’s experience compromising Fortune-50 companies at the DefCon 21 and 22 Social Engineering Capture the Flag (SECTF) competition and other smaller targets on more recent consulting engagements. The DefCon SECTF participants competed to gather openly available information on their corporate targets both on the Internet and over the phone. Some companies put up better defenses than others. Social engineering remains a threat to companies of all sizes and industries. Verizon?s 2013 Data Breach Investigations Report cites that 29% of breaches investigated had a social engineering component. Social engineers manipulate human beings to get them to reveal information or take a particular action, such as clicking a malicious link. Information gained via social engineering is then used to gain access to information systems or sensitive data. Attendees will learn the factors that contributed to the presenter’s success and how simple changes could have frustrated her intelligence gathering operations. Session participants will also learn how to detect social engineering attacks and react to them appropriately. And yes, there will be pwnage. Takeaways: Understanding of the social engineering process; Actionable tips that can be used in any company. Bio: Jen Fox, CIPT, is a Sr. Security Consultant and governance Practice Lead at VioPoint. Her 20+ years in IT and information security includes training, usability design, business process analysis, risk management, vendor risk management, and security awareness. Specialties include information elicitation and business/technology translation. She is also a locksport enthusiast and Myers-Briggs nerd. For More Information Please Visit: – http://circlecitycon.com/ http://www.irongeek.com/i.php?page=videos/circlecitycon2015/mainlist

securitytube

SecurityTube.Net
http://feedproxy.google.com/~r/SecurityTube/~3/fK1HPs-rrhc/13385

New Space Shuttle exhibit offers first public display of Columbia, Challenger artifacts and debris

New Space Shuttle exhibit offers first public display of Columbia, Challenger artifacts and debris

ChallengerColumbia
NASA is displaying artifacts and debris from both Columbia and Challenger. In some cases, these artifacts have never before been seen in public.

ExtremeTech » News & Updates For Hardcore Tech Fans | ExtremeTech
http://www.extremetech.com/extreme/209059-new-space-shuttle-exhibit-offers-first-public-display-of-columbia-challenger-artifacts-and-debris