Issue highlights 1. Petition calls for an end to passwords 2. What IT recruiters know about you -- whether you're looking or not 3. 3D printing could trigger intellectual property wars, legal expert says 4. 3D printing has more to fear from LEGO than LEGO has to fear from 3D printing 5. New digitally signed Mac malware confuses users with right-to-left file name tricks 6. How Google and Blue Box sparked an important open source discussion 7. W3C rejects ad industry attempt to hijack do-not-track specs 8. Hijacking Office 365 and other major services via cookie re-use flaw 9. Gigabit-boosted DSL Internet standard could be ready in 2014, ITU says 10. Android mega flaw fixed but phones remain vulnerable 11. INSIDER 5 security best practices for SMBs 12. Why SaaS HR Software Is Ready to Take Off |
RESOURCE COMPLIMENTS OF: BlackBerry When you install BlackBerry® Enterprise Service 10 you qualify for 30 days of complimentary support to get you started using the software to its full potential. Also, all purchases of annual BlackBerry Enterprise Service 10 licenses come with complimentary BlackBerry® support, including 12x5 access to technical experience, online support and more. Learn more about the support services that are available once you've downloaded BlackBerry Enterprise Service 10. |
Passwords are a thing of the past -- and they need to go, according to a group of Silicon Valley-based tech companies who are part of a public advocacy campaign called Petition Against Passwords. READ MORE |
What recruiters know about you is about to get a whole lot deeper than what you put on your resume. An emerging class of search engines is taking a big data approach to recruiting by crawling the Web for every bit of data about you, assembling it into a master profile, rating your knowledge, skill levels and interests, and serving it up to recruiters who can filter it by location, skill, the school you attended and a range of other criteria. READ MORE |
If 3D printing fulfills the potential that some have predicted for it, the technology could plague some businesses with the same intellectual property nightmares that struck the music and film industries after the introduction of Napster, according to one legal expert. READ MORE |
Predicting the future of cutting edge technology is popular among pundits because prognosticating is easy - no license required - and there's very little chance of ever being held accountable (unless you predicted that the iPhone would flop). READ MORE |
WHITE PAPER: EMC Corporation & WWT Prior to the VSPEX sale, the customer faced multiple challenges in delivering a fast and reliable VDI end-user experience. After working with the customer to understand the server, storage, and networking requirements Read Now |
A new piece of digitally signed spyware for Mac OS X uses a special Unicode character in its file name to hide its real file extension from users and trick them into installing it. READ MORE |
There has been a lot of chatter on social media and in forums about the Android master key vulnerability controversy caused by its public disclosure by Jeff Forristal, CTO of Blue Box. Some very sharp developers and security analysts posted coding explanations and personal opinions. READ MORE |
The World Wide Web Consortium has rejected an attempt by the advertising industry to hijack a specification describing how websites should respond to "do not track" requests sent by Web browsers. READ MORE |
When is logging off the opposite of security? One example would be Office 365 since logging off blocks the authorized user, but not the attacker. Microsoft's Office 365 isn't the only offender as ethical hacking professor Sam Bowne pointed out after testing cookie-reuse on major websites. READ MORE |
WEBCAST: HP Autonomy Visit this Interactive Resource Center, designed to dispel any concerns you may have. It's packed with informative videos, whitepapers and case studies as well as Twitter feeds and a live Forumeverything you need to move confidently to the cloud. View Now! |
A broadband standard that aims to support bandwidth-intensive applications such as streaming Ultra-HDTV movies without the need to install fiber between the distribution point and people's homes met its first-stage approval, the International Telecommunication Union (ITU) said on Tuesday. READ MORE |
Handset makers are slow to push fix to users, and fragmentation is not helping in the enterprise READ MORE |
If your small-to-midsized business is like most, you're playing a game of chicken with cyber-criminals. You probably know that your defenses probably aren't able to repel today's sophisticated, persistent attacks, yet you hope that you'll be overlooked. READ MORE |
It's estimated that 90 percent of Fortune 1000 companies plan to replace their human resources management software in the next four years. Many are replacing these legacy on-premises systems--some of which date back to the 1960s--with cloud-based HR systems. On top of hardware savings, enterprises using SaaS HR say they spend less on support. READ MORE |
WHITE PAPER: Condusiv Technologies In this Technology Spotlight, IDC highlights the unexpected I/O explosion brought about by virtualization and presents new technologies that deliver exceptional application performance without additional hardware by eliminating unnecessary I/O traffic at the source. Read more. Read Now! |
|
No comments:
Post a Comment