Worldwide Server Shipments and Revenue Continue Decline in 1Q17 as Cloud Impact Grows

2017 hasn’t been a decent year so far for the server market. Examiner firms Gartner and IDC have issued their separate initially quarter 2017 worldwide server reports, demonstrating a decrease in both income and shipments. Gartner revealed that in the main quarter of 2017, overall server income declined 4.5 percent year over year to $12.5 billion. IDC’s estimations are somewhat extraordinary however demonstrate a comparable pattern, with server income down 4.6 percent to $11.8 billion.


Baijiu Malware is Distributed Through the Geocities’ Web Hosting Platform

With new innovation and technology emerging everyday, these technologies can be consolidated with internet to make a capable malware strain and thats what Baijiu malware is. It tries to target individuals who demonstrate an expanded enthusiasm for North Korea.


Amazon-Apple TV deal shows tough road to cooperation for tech rivals

A deal bringing Amazon Prime Video to Apple TV, announced on Monday at Apple Inc’s developer conference after years of talk, shows how competitive tensions among Silicon Valley titans can stand in the way of serving customers.

The logic of linking Apple TV, a device for watching television over the internet, with Inc’s booming video-streaming service looks obvious.


After “Wanna Cry” Here comes the “Judy”

A malware named Judy has found over 41 apps on Google Play Store and has infected over 36 million users according to a security firm Check Point.

Google has started removing those infected apps from Play Store after Check Point report about the malware to Google. But before it can totally be taken off from Google Play Store Judy manage to infect Android devices and reached up-to 18 million Download.


GoDaddy to launch dedicated web hosting services for SMEs in India Soon


In a bid to create an e-ecosystem for the Small and Medium Businesses in India the internet domain and host GoDaddy is going to launch a dedicated hosting package for the SMEs soon.


Zomato explains how hack happened

Zomato’s user database was breached and put up for sale on a dark web marketplace for $1000, the restaurant search and food delivery portal explained how the hack took place.

In a blog, Zomato explained that the hacker got their developer’s credentials from an October 2015 leak of a webhosting service’s details. The developer used the same username and password combination on Github, a portal that is popular among software developers for sharing code. It was here that the hacker got to a part of the code that this developer had access to. Interestingly, Zomato says the hacker managed this breach last year, but highlighted it only now.

After finding user name and encrypted or “hashed” passwords of its users for sale on a dark web marketplace on May 18, Zomato claimed it had contacted the hacker who had executed the data theft. The hacker, the company claimed in an official bog, only wanted to highlight bad information security practices, and had asked Zomato to hold a better “bug bounty” program, where security researchers and ethical hackers are rewarded for highlighting bugs in the system. Zomato claimed that the hacker took the data off the marketplace after they agreed to his/her demands. They also promised to update users about how the hack took place once they had plugged all loopholes that the hacker highlighted.

“It all started in November 2015, when 000webhost’s user database was leaked online (with plain text passwords). One of our developers had his personal hosting account with the service. As a result of 000webhost’s user account data breach, his email address and password also became available publicly. Unfortunately, the developer was using the same email and password combination on Github,” Zomato founder Deepinder Goyal said in the blog update. It was here that the hacker was able to scan through the code and exploit a vulnerability without needing physical access to a system on a set of IP addresses defined by Zomato. Goyal says in the blog post that Zomato made two-factor authentication on Github mandatory for its employees “a few months back”. However, in what he terms “extraordinarily bad luck”, the hacker had this access last year itself. It was only now that s/he chose to exploit it. “Yes, someone has some of our code, and that’s a risk. But we have taken every step conceivable to us to make sure that the code cannot be exploited in any way possible to breach Zomato’s infrastructure. Also, one more thought that gives us comfort – with every passing day, the leaked code is getting more and more out-of-date,” Goyal writes in the blog post. Zomato says it now wants to establish a “working group” of Indian internet companies to deliberate on “best practices” for information security.

Canadian Web Hosting Introduces Virtual Private Server Plans with Built-in Disaster Recovery Services

One of the leading web hosting service providers Canadian Web Hosting announced yesterday, There release of new Virtual Private Server Plans with built-in disaster recovery called VPS SAFE plans. These new disaster recovery plans can be added in just a few clicks and make it easier than ever to have true disaster recovery.


Google AI : From Mobile First to AI First

AT annual Google I/O conference CEO Sundar Pichai reveals a second-generation Tensor Processing Unit: a cloud-computing system and a custom hardware for machine learning which is 30% – 50% more faster than CPU & GPU and will compete with Microsoft Azure and Amazon AWS. These Cloud TPU are soon coming to Google Compute Engine – Pichai said.