Issue highlights 1. iPad 5 rumor rollup for the week ending July 3 2. Vulnerability allows attackers to modify Android apps without breaking their signatures 3. BART strike provides stark contrast to tech's non-union world 4. Spam blizzards used to hide malicious activities 5. Software vendor Trend Micro to sell home photo storage device 6. The Big Data Security Analytics Trifecta 7. Pluto's moons named Styx and Kerberos, despite vote for Vulcan 8. Ubisoft warns of account database breach after website attack 9. Microsoft CRM update to focus on marketing, mobility and usability |
WEBCAST: Ruckus Wireless The BYOD phenomenon is no longer a phenomenon but a way of life for IT managers. Dealing with every user now armed with multiple smart devices, some of which are IT sanctioned, the others of which aren't, are driving network manager to the brink of insanity. View Now |
Apple iPad 5 scuttlebutt: Machinist drawings, muddled dates, disappearing discounts, bezel bedazzles READ MORE |
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS. READ MORE |
The strike by San Francisco Bay Area transit workers this week is a clear and naked display of union power, something that's probably completely alien to tech professionals. READ MORE |
WHITE PAPER: F5 Networks As demands on data center infrastructure increase, both IT professionals and their tools will need to adapt. Learn how application delivery controllers (ADCs) can accommodate enterprise needs for performance and scalability while providing a unified platform for application services. Download the report today. Download Now |
Distributed Spam Distraction attacks may last up to 24 hours, and inundate an inbox with as many as 60,000 messages, AppRiver report notes READ MORE |
Japan-based security software vendor Trend Micro is planning a rare foray into hardware, with a home storage device for managing photos from multiple cameras and smartphones. READ MORE |
Like many of my industry peers, I've been writing and speaking a lot about big data security analytics. The general hypothesis is that status quo security processes and technologies no longer provide adequate protection against voluminous, sophisticated, and targeted threats, so we need better security analytics to understand what's happening in real-time. With improved situational awareness,... READ MORE |
WHITE PAPER: Verizon In this Verizon Knowledge Vault, you'll learn from videos and other downloadable resources how to move large amounts of data reliably and securely, how to increase performance for the cloud and how to balance risk and opportunity in the cloud era with the help of Verizon Network and Cloud Solutions. Learn More |
The International Astronomical Union vetoed a public vote to name one of Pluto's two most recently discovered moons Vulcan and named the moons Styx and Kerberos. READ MORE |
Game maker Ubisoft said on Tuesday an account database was breached due to unauthorized access of one of its websites, revealing users' personal information. READ MORE |
Microsoft is preparing to launch a new version of its Dynamics CRM (customer relationship management) software that will include improved mobile applications and integrations with Yammer, Skype and the company's MarketingPilot marketing automation software. READ MORE |
WHITE PAPER: APC by Schneider Electric In this eGuide, you will learn some recent trends in power and cooling efficiency, offer advice to small organizations and examine how modern-day data centers attempt to tackle these problems. Learn More. |
|
No comments:
Post a Comment