Tuesday, June 10, 2014

iOS 8 MAC randomizing just one part of Apple’s new privacy push

  Microsoft addresses IE zero-day exploit, 58 others with Patch Tuesday release | Sterling fights Ballmer's $2B deal to buy LA Clippers

 
  Network World After Dark

Forward this to a Friend >>>


iOS 8 MAC randomizing just one part of Apple's new privacy push
The new MAC address randomization feature in iOS 8 is just one of a battery of new privacy features Apple is introducing. It's part of an Apple push to make mobile app developers more aware of enduser privacy and to give them iOS tools to make privacy-related app actions clearer, so that users can allow them or not. A young Swiss security researcher, Frederic Jacobs (@FredericJacobs) apparently was the first to tweet about one of the new privacy features: a change in iOS that lets the device's radio use, in effect, fake MAC addresses when scanning for nearby Wi-Fi networks. When the user decides to associate with a specific network, the device uses its true MAC address.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Network Instruments

4 Key Survival Tips for Planning Your Next Big Data Project
Big Data projects slam network performance. This paper offer survival tips to prepare your network before the Big Data projects hit, not after. Learn how to monitor and manage network performance for bandwidth, consistent low latency, scalable storage, processing power and security. Learn More

WHITE PAPER: Netscout Systems Inc.

Enabling Unified Service Delivery Management With nGeniusONE
Today's IT organizations manage diverse business services comprising a host of applications running on many server farms within the data center. NetScout provides a highly scalable, unified approach to service delivery management that enables efficient, topdown performance management across complex application, server and network tiers. Learn More

Microsoft addresses IE zero-day exploit, 58 others with Patch Tuesday release
It's wise to ask what if [insert scary insecurity scenario] happened. But forget about "what if" hypothetical mentality and worst-case cybersecurity scenarios for a minute, Microsoft's Dustin Childs advised before launching into the reality of the here and now for the critical MS14-035 Internet Explorer patch; it resolves 59 items, including CVE-2014-1770, which was publicly disclosed by HP TippingPoint's Zero Day Initiative (ZDI) after Microsoft failed to fix the flaw for over 180 days.To read this article in full or to leave a comment, please click here Read More
 

Sterling fights Ballmer's $2B deal to buy LA Clippers
Steve Ballmer's dream of owning an NBA team became less certain with the announcement by Donald Sterling that he won't support selling the L.A. Clippers to the former Microsoft CEO for $2 billion. Read More
 

Microsoft keeps Xbox One E3 focus on games
Editor's Note: The following is a transcript of the video seen above: Voiceover: When head of Microsoft's Xbox division Phil Spencer took the stage ahead of E3 and said the company's presentation would be all about games this year, he wasn't kidding. For the next 90 minutes the company showed trailer after trailer of exclusive titles that would come to the Xbox One console over the next year. Read More
 

Microsoft boosts Skype for iPhone speeds 5X
Using Skype on Apple iPhones will be five times faster than they are now with Microsoft's release next week of Skype 5.0 for iPhone. The goal of rewriting the app "from the ground up," says Microsoft in a blog, is to make Skype on iPhones familiar to anyone who has used Skype on Windows Phone and Android phones, but at the same time take advantage of features unique to iOS. +Also on Network World: iPhone 6 rumor rollup for the week ending June 6 | Skype-based malware shows how 'peculiar' malicious code can be +To read this article in full or to leave a comment, please click here Read More
 

Sony mixes hardware, game announcements at E3 2014
Contrasting sharply with Microsoft's game title heavy Xbox briefing, Sony kicked off its presentation with a new glacier white PlayStation 4 bundle which will be available in September. Read More
 

California Chrome owner can kiss Google endorsement goodbye
It didn't take much horse sense to sniff out (with our without a nose patch) a possible marketing opportunity between race horse California Chrome and web browser Google Chrome, which of course comes out of one of the hottest California companies around.Google Chrome: A Triple threat...a browser for your desktop, tablet and smartphone, etc., etc.+Also on Network World: 12 Chrome Extensions power users will love + To read this article in full or to leave a comment, please click here Read More
 

HP has lots to Discover (slideshow)
Image by HPHP is launching a raft of new products at its annual Discover conference this week that explore the mysteries of unchartered IT territory in network, server, storage and application areas. Image by HPTo read this article in full or to leave a comment, please click here Read More
 

Big data security analytics can become the nexus of information security integration
In a recent ESG research survey (note: I am an employee of ESG), security professionals working at enterprise organizations (i.e. more than 1,000 employees) were asked the following question: How do you believe that your organization will change its security technology strategy decisions in any of the following ways over the next 24 months in order to improve its security management?In response: 44% said that they planned to "design and build a more integrated security architecture." In other words, they want central configuration management, policy management, and reporting for different security technologies. 39% said that they planned to "include new data sources for security intelligence." This means that they plan to collect more internal data from networks, applications, and security devices and also consume more external threat intelligence from existing security vendors or innovative newcomers like BitSight, Norse, and Vorstack. These are worthwhile plans, but there is still a slight problem with the first initiative – building an integrated enterprise security architecture could take years as large organizations replace existing products as they are fully amortized and integrate them together through some common APIs and middleware. In the meantime, they will have to manage enterprise security through an army of point tools and manual processes.To read this article in full or to leave a comment, please click here Read More
 

FAA sets first commercial drone flights
  The Federal Aviation Administration today said it gave approval to energy company BP to fly small unmanned aircraft in commercial airspace over Alaska. Specifically the FAA issued a Certificate of Waiver or Authorization to survey BP pipelines, roads and equipment at Prudhoe Bay, the largest oilfield in the United States. The FAA has said in the past it would set at least three permanent Arctic areas where unmanned aircraft operations would take place.+More on Network World: The coolest Air Force UFO videos+To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Network World's 2014 State of the Network survey

Exclusive research from Network World shows that cloud and mobility are gaining in importance.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. What's the best approach to building next-generation data center networks?

2. HP unveils Cisco-like SDN switch

3. Rack-mount? ... We don't need no stinkin' rack-mount

4. How to change Windows 8.1 to local account with no Microsoft email account required

5. The SAN is dead! Long live the storage fabric!

6. Cisco takes early lead in SDN thought leadership

7. Daunting photos of a village built to handle electronic waste

8. 10 great new features in Microsoft Azure

9. TrueCrypt's abrupt demise 'puzzling, bizarre'

10. 12 most powerful Internet of Things companies


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment