| iOS 8 MAC randomizing just one part of Apple's new privacy push The new MAC address randomization feature in iOS 8 is just one of a battery of new privacy features Apple is introducing. It's part of an Apple push to make mobile app developers more aware of enduser privacy and to give them iOS tools to make privacy-related app actions clearer, so that users can allow them or not. A young Swiss security researcher, Frederic Jacobs (@FredericJacobs) apparently was the first to tweet about one of the new privacy features: a change in iOS that lets the device's radio use, in effect, fake MAC addresses when scanning for nearby Wi-Fi networks. When the user decides to associate with a specific network, the device uses its true MAC address.To read this article in full or to leave a comment, please click here Read More WHITE PAPER: Network Instruments
4 Key Survival Tips for Planning Your Next Big Data Project Big Data projects slam network performance. This paper offer survival tips to prepare your network before the Big Data projects hit, not after. Learn how to monitor and manage network performance for bandwidth, consistent low latency, scalable storage, processing power and security. Learn More WHITE PAPER: Netscout Systems Inc.
Enabling Unified Service Delivery Management With nGeniusONE Today's IT organizations manage diverse business services comprising a host of applications running on many server farms within the data center. NetScout provides a highly scalable, unified approach to service delivery management that enables efficient, topdown performance management across complex application, server and network tiers. Learn More Microsoft addresses IE zero-day exploit, 58 others with Patch Tuesday release It's wise to ask what if [insert scary insecurity scenario] happened. But forget about "what if" hypothetical mentality and worst-case cybersecurity scenarios for a minute, Microsoft's Dustin Childs advised before launching into the reality of the here and now for the critical MS14-035 Internet Explorer patch; it resolves 59 items, including CVE-2014-1770, which was publicly disclosed by HP TippingPoint's Zero Day Initiative (ZDI) after Microsoft failed to fix the flaw for over 180 days.To read this article in full or to leave a comment, please click here Read More Sterling fights Ballmer's $2B deal to buy LA Clippers Steve Ballmer's dream of owning an NBA team became less certain with the announcement by Donald Sterling that he won't support selling the L.A. Clippers to the former Microsoft CEO for $2 billion. Read More Microsoft keeps Xbox One E3 focus on games Editor's Note: The following is a transcript of the video seen above: Voiceover: When head of Microsoft's Xbox division Phil Spencer took the stage ahead of E3 and said the company's presentation would be all about games this year, he wasn't kidding. For the next 90 minutes the company showed trailer after trailer of exclusive titles that would come to the Xbox One console over the next year. Read More Microsoft boosts Skype for iPhone speeds 5X Using Skype on Apple iPhones will be five times faster than they are now with Microsoft's release next week of Skype 5.0 for iPhone. The goal of rewriting the app "from the ground up," says Microsoft in a blog, is to make Skype on iPhones familiar to anyone who has used Skype on Windows Phone and Android phones, but at the same time take advantage of features unique to iOS. +Also on Network World: iPhone 6 rumor rollup for the week ending June 6 | Skype-based malware shows how 'peculiar' malicious code can be +To read this article in full or to leave a comment, please click here Read More Sony mixes hardware, game announcements at E3 2014 Contrasting sharply with Microsoft's game title heavy Xbox briefing, Sony kicked off its presentation with a new glacier white PlayStation 4 bundle which will be available in September. Read More California Chrome owner can kiss Google endorsement goodbye It didn't take much horse sense to sniff out (with our without a nose patch) a possible marketing opportunity between race horse California Chrome and web browser Google Chrome, which of course comes out of one of the hottest California companies around.Google Chrome: A Triple threat...a browser for your desktop, tablet and smartphone, etc., etc.+Also on Network World: 12 Chrome Extensions power users will love + To read this article in full or to leave a comment, please click here Read More HP has lots to Discover (slideshow) Image by HPHP is launching a raft of new products at its annual Discover conference this week that explore the mysteries of unchartered IT territory in network, server, storage and application areas. Image by HPTo read this article in full or to leave a comment, please click here Read More Big data security analytics can become the nexus of information security integration In a recent ESG research survey (note: I am an employee of ESG), security professionals working at enterprise organizations (i.e. more than 1,000 employees) were asked the following question: How do you believe that your organization will change its security technology strategy decisions in any of the following ways over the next 24 months in order to improve its security management?In response: 44% said that they planned to "design and build a more integrated security architecture." In other words, they want central configuration management, policy management, and reporting for different security technologies. 39% said that they planned to "include new data sources for security intelligence." This means that they plan to collect more internal data from networks, applications, and security devices and also consume more external threat intelligence from existing security vendors or innovative newcomers like BitSight, Norse, and Vorstack. These are worthwhile plans, but there is still a slight problem with the first initiative building an integrated enterprise security architecture could take years as large organizations replace existing products as they are fully amortized and integrate them together through some common APIs and middleware. In the meantime, they will have to manage enterprise security through an army of point tools and manual processes.To read this article in full or to leave a comment, please click here Read More FAA sets first commercial drone flights The Federal Aviation Administration today said it gave approval to energy company BP to fly small unmanned aircraft in commercial airspace over Alaska. Specifically the FAA issued a Certificate of Waiver or Authorization to survey BP pipelines, roads and equipment at Prudhoe Bay, the largest oilfield in the United States. The FAA has said in the past it would set at least three permanent Arctic areas where unmanned aircraft operations would take place.+More on Network World: The coolest Air Force UFO videos+To read this article in full or to leave a comment, please click here Read More | |
No comments:
Post a Comment