Google expands bug bounty program to include fraud protection bypass, free purchases

August 16, 2018

Via: ZDnet
Category: Innovations, Trends

Google has expanded its bug bounty program to include external attack techniques and vectors which threat actors may exploit to bypass abuse, fraud, and spam systems developed by the company. On Wednesday, Android software engineer Eric Brown and program manager […]

StarVR Teases New Version of Its High-end VR Headset to be Revealed Next Week

August 9, 2018

StarVR, creator of a high-end VR headset for out-of-home use, is teasing something new to be revealed next week at SIGGRAPH 2018. StarVR is a high-end headset made for out-of-home use like VR arcades and attractions. The headset’s main selling […]

The security slowdown: How to maximise cloud performance while keeping your data safe

August 2, 2018

Category: Cloud Computing

Organisations are moving to public cloud infrastructures to do business faster with more customers. With the increase in traffic, though, comes a need for more inspection capacity that could potentially slow things down in the name of keeping data safe. […]

Types, Videogame Virtualization

The Exorcist: Legion VR Is Finally Complete With Fifth Chapter

August 15, 2018

Via: UploadVR

Over 10 months since its initial unveiling, Wolf & Wood’s Exorcist VR saga is finally complete. This week sees the launch of the fifth and final installment in the episodic horror VR game, named The Tomb, on Steam and Oculus […]

Cloud Computing

Oracle accused of misrepresenting its cloud revenue growth in lawsuit

August 14, 2018


Oracle is facing a legal threat after a lawsuit has alleged the company used ‘threats and extortive tactics’ when selling its cloud products. The City of Sunrise Firefighters’ Pension Fund is suing Oracle for allegedly misleading shareholders and ‘misrepresenting the […]

Challenges, Trends

IoT Cybersecurity Requires More Than Scare Tactics

August 14, 2018

Via: SQL Server Pro

LAS VEGAS — McAfee’s Lead Scientist and Senior Principal Engineer Christiaan Beek was in the hospital with his expectant wife when he inadvertently learned about a troubling IoT cybersecurity vulnerability. When the ultrasound technician measured the size of their youngest […]