Search This Blog

Friday, April 18, 2014

Michaels says breach at its stores affected nearly 3M payment cards

Playstation 4 leads Xbox One in sales, is catching up in sharing features

Michaels says breach at its stores affected nearly 3M payment cards

ITworld Today
April 18, 2014
Share this email

Twitter to promote app downloads in mobile timelines

Twitter's new mobile advertising suite lets companies pitch their mobile apps in promoted tweets or place ads inside other apps.

READ MORE
 

Issue highlights

1. Playstation 4 leads Xbox One in sales, is catching up in sharing features

2. Michaels says breach at its stores affected nearly 3M payment cards

3. Tor anonymity network to shrink as a result of Heartbleed flaw

4. Japan gets first bitcoin ATM, two more on order

5. China's Alibaba to offer mobile phone services in June

6. Unbounded Robotics launches robot platform for education, research

7. Report: Oracle pushes back against Oregon officials over troubled health care site

White Paper: Perforce Software

Continuous Delivery: 5 Habits of Successful Practitioners

Whether it's New York Stock Exchange or Netflix, Samsung or Salesforce.com, companies of all kinds have embraced the design practice known as Continuous Delivery--a discipline in which software can be released to production at any time. In this Best Practices eBook, discover 5 habits that set top practitioners apart. Learn more >>

Playstation 4 leads Xbox One in sales, is catching up in sharing features

Also Spiderman may be avoiding the Xbox One, and Playstation Now is coming to Bravia TVs READ MORE

Michaels says breach at its stores affected nearly 3M payment cards

About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday. READ MORE

Tor anonymity network to shrink as a result of Heartbleed flaw

The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity. READ MORE

White Paper: CA Technologies

Complexity Ate My Budget

When it comes to data protection, having multiple point solutions is not the answer. Find out how to gain a holistic view of your IT infrastructure, with an emphasis on business needs and IT/data risk and recovery, that will inform your choice for a comprehensive, cost-effective data protection solution. Read now!

Japan gets first bitcoin ATM, two more on order

Formula One racing and cryptocurrency have nearly nothing in common -- except Suzuka. The home of the Japanese Grand Prix will soon debut Japan's first bitcoin ATM. READ MORE

China's Alibaba to offer mobile phone services in June

Alibaba's Tmall and Taobao sites already sell everything from clothes and furniture to car tires and medicines. But soon they'll also be offering 3G data and voice call plans as well, the Chinese e-commerce giant said Thursday. READ MORE

Unbounded Robotics launches robot platform for education, research

If you fear the rise of robots, the latest humanoid-style machine has an "emergency stop to prevent robot apocalypse." READ MORE

Report: Oracle pushes back against Oregon officials over troubled health care site

Oracle is gearing up for a fight with officials in Oregon over its role developing an expensive health insurance exchange website that still isn't fully operational. READ MORE

White Paper: IBM

3 capabilities to fuel today's dynamic forecasting

IBM Cognos software can provide businesses with the business insight they need to be prepared, not scared. Cognos software allows businesses to analyze performance, model business strategies and processes, and contribute to a common set of business objectives. Learn More

BOOK GIVEAWAY:

We've got 5 copies of each of these new books to give to some lucky ITworld readers. Enter today for your chance to win!

Quality Code: Software Testing Principles, Practices, and Patterns
Using real-world code examples, Stephen Vance introduces patterns, principles, and more than two dozen detailed techniques for testing any software system more fully, effectively, and painlessly.

Java SE8 for Programmers, 3rd Edition
Hundreds of complete Java programs with thousands of lines of proven Java code, and hundreds of tips will help you build robust applications.

DON'T MISS...

16 terrible computer pranks that could get you fired

Your new PC needs these 22 free programs

8 books every IT leader should read this year
 

A method to the madness: How 13 programming languages got their names

IT Salary Survey, 2014: How IT pros really feel about their pay, stress, and career prospects

Follow ITworld

Share this email

You are currently subscribed to itworld_today as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments: