Friday, July 19, 2013

Apple, Samsung phone security features to be scrutinized

Vulnerability found in Java 7 opens door to 10-year-old attack

In the run-up to security conference Black Hat, all apps are suspicious

Network World Daily News AM
July 19, 2013
Share this email

Apple, Samsung phone security features to be scrutinized

A call by U.S. prosecutors for phone manufacturers to install a "kill switch" to discourage smartphone theft has taken a step forward, with Apple and Samsung providing handsets whose security features will be put to the test.

READ MORE
 

Issue highlights

1. Vulnerability found in Java 7 opens door to 10-year-old attack

2. In the run-up to security conference Black Hat, all apps are suspicious

3. New Jersey Supreme Court rules warrants needed for phone tracking

4. UK to probe Huawei's cybersecurity evaluation center

5. Apple reportedly interested in purchasing 55 and 65-inch Ultra HD TV panels from LG

6. Why I didn't get early Google Glass hardware with #ifihadglass

7. Just like that, Android 4.3 is out, ahead of its release date

8. 12 of the worst data breaches of 2013 so far

9. 'This is a 3D printed jet engine'

RESOURCE COMPLIMENTS OF: Cisco

Cisco Nexus 1000V delivers data center consistency to cloud

Knowing is half the battle. And there are many technical challenges for virtualized network environments on the way to cloud-readiness. Gary Kinghorn, Senior Solution Marketing Manager at Cisco, and Bob Laliberte, Senior Analyst at the Enterprise Strategy Group (ESG), discuss these obstacles in this informative webinar. Learn how Cisco Nexus 1000V helps

Vulnerability found in Java 7 opens door to 10-year-old attack

Security researchers from Polish vulnerability research firm Security Explorations claim to have identified a new vulnerability in Java 7 that could allow attackers to bypass the software's security sandbox and execute arbitrary code on the underlying system. READ MORE

In the run-up to security conference Black Hat, all apps are suspicious

In the run-up to security conference Black Hat, all apps are suspicious Navigating city streets, walking to work... you see cell phones, everywhere. Three out of four of those are Android, according to Gartner. Users might feel c... From: networkworld Views: 0 1 ratings Time: 03:09 More in Science & Technology READ MORE

New Jersey Supreme Court rules warrants needed for phone tracking

Cellphone users have a reasonable expectation of privacy in their cellphone location information, and police must obtain a search warrant before accessing that information, the Supreme Court of New Jersey ruled Thursday. READ MORE

WEBCAST: Sprint

The Network Foundation of an IT-to-ET Transformation

There's an evolutionary process at work that will eventually affect every enterprise IT department. Nemertes Research describes it as a transformation from IT to ET – Enterprise Technology. Learn More

UK to probe Huawei's cybersecurity evaluation center

The U.K. government is launching a review of a vetting process for products from Huawei Technologies, reflecting continuing security concerns about the Chinese company. READ MORE

Apple reportedly interested in purchasing 55 and 65-inch Ultra HD TV panels from LG

If there's one Apple related rumor that just won't die, it's the long-rumored Apple HDTV. Indeed, rumors of Apple releasing a dedicated HDTV set go back many years. The reality, though, is that the HDTV market isn't exactly in desparate need of innovation. What's more, the margins on HDTVs aren't as high as the margins Apple typically enjoys on its other products. Nonetheless, there is a very real... READ MORE

Why I didn't get early Google Glass hardware with #ifihadglass

When Google announced it would select who got early access to Google Glass hardware by sharing their pitch on Google Plus with the hashtag "#ifihadglass" I had to have a shot at it. So it was that back in February this year I shared the following on Google Plus: READ MORE

WHITE PAPER: Verizon

Building the Best Network for the Cloud

In this Verizon Knowledge Vault, you'll learn from videos and other downloadable resources how to move large amounts of data reliably and securely, how to increase performance for the cloud and how to balance risk and opportunity in the cloud era with the help of Verizon Network and Cloud Solutions. Learn More

Just like that, Android 4.3 is out, ahead of its release date

In the same way that watched pots never boil, hotly anticipated Android versions often aren't released when we think they should be. However, turn your back for a second and bang – suddenly Jelly Bean 4.3's all over the Internet. READ MORE

12 of the worst data breaches of 2013 so far

READ MORE

'This is a 3D printed jet engine'

The tweet from General Electric reads: "This is a 3D printed jet engine." Is it real? Well, yes and no. "While it's not to scale, this 1.5 inch long model was made entirely from direct metal laser melting and required no assembly," explains GE in another tweet. Does it work? "Not quite," GE acknowledges. "However, the fan blades are able to rotate!" READ MORE

WEBCAST: Egnyte

The Benefits of Hybrid Cloud Sharing

Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with short videos, white papers and demos. View Now!

SLIDESHOWS

Can your IP address give away your identity?

Can hackers, stalkers, criminals, and other Internet users track you down by your Internet Protocol (IP) address?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Hacking to rig election earns college student one-year prison sentence

2. Facebook Open Compute project has "weaknesses," Cisco CEO says

3. Citrix edges Microsoft and VMware in VDI face-off

4. Firefox OS for phones is shipping, and it is impressive

5. iPhone 5S specs leaked: NFC, 12-MP camera, and fingerprint authorization sensor expected

6. Cisco building an Internet of Everything router: Chambers

7. Can your IP address give away your identity?

8. Is Microsoft starting from scratch with Windows Phone 9?

9. FBI Ransomware spotted on Mac OS X

10. Yahoo buys Admovate to ramp up its mobile advertising

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: