Tag Archive for: LESS

Less than 10% of Gmail users have enabled two-factor authentication

Less than 10% of Gmail users have enabled two-factor authentication

Don’t make life easy for account hackers. Defend your online accounts with two-step verification.

Read more in my article on the Tripwire State of Security blog.

Graham Cluley

Shell invests in Nashville solar firm, but it’s no less an oil company

Enlarge / This photo represents a previous project completed by the Green Power EMC and Silicon Ranch partnership. The 52 MW ac solar energy plant in Hazlehurst, Georgia incorporates 633,600 solar modules. (credit: PRNewsfoto/Silicon Ranch Corporation)

On Monday, Royal Dutch Shell announced that it is going to acquire a 43.86-percent stake in a Nashville-based solar plant company called Silicon Ranch Corporation. The deal could cost up to $ 217 million, according to Reuters.

The Netherlands-based oil and gas company is one of the biggest companies in the world, and, by its own account, it recorded revenue of $ 233.6 billion in 2016 and $ 4.8 billion in net income. The $ 217 million it has set aside for a US-based solar investment is a small fraction of that, but it does reflect some willingness to acknowledge a future, however far out, in which oil and gas may not dominate energy and transportation sectors.

The move follows oil and gas giant BP (formerly British Petroleum), which invested $ 200 million in European solar development company Lightsource just a month ago.

Read 6 remaining paragraphs | Comments

Biz & IT – Ars Technica

HP’s second laptop keylogger in less than a year

The HP laptop keylogger

Researcher Michael Myng was trying to work out how to control the backlight on an HP laptop keyboard. What he found was something rather troubling.

Graham Cluley

Chinese Hacking Efforts More Strategic, Less Noisy – BleepingComputer

Chinese Hacking Efforts More Strategic, Less Noisy
BleepingComputer
Chinese hackers, once some of the most careless and noisy hackers around, have become very careful and much more strategic at choosing the targets they go after. The prototype of the Chinese hacker is well documented in the cyber-security industry.

China hackers – read more