Search This Blog

Tuesday, July 01, 2014

10 disturbing attacks at Black Hat USA 2014

The soldier who got an Army medal for programming

Microsoft's crusade against malware advances to Kuwait, Algeria

ITworld Today
July 01, 2014
Share this email

10 disturbing attacks at Black Hat USA 2014

Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets, more.

READ MORE
 

Issue highlights

1. The soldier who got an Army medal for programming

2. Microsoft's crusade against malware advances to Kuwait, Algeria

3. Google launches 'cookie choices' site to let Europeans know how they're being tracked

4. Databricks takes on Google streaming analysis with Spark

5. Lenovo/IBM deal in danger due to politics

6. Samsung finds labor violations at Chinese suppliers

7. Energy providers hacked through malicious software updates

8. Razer's Project Christine modular PC struggling to find OEM partner support

White Paper: HootSuite Media, Inc.

Social Media in Technology: A Unified Strategy for Success

Find out how social media is sparking a new era of customer and industry-understanding in technology enterprises and how industry leaders are overcoming the challenges of integrating social media across their organization. Learn More

The soldier who got an Army medal for programming

One veteran shares his tale of being recognized for using his coding skills to make his military unit more efficient. READ MORE

Microsoft's crusade against malware advances to Kuwait, Algeria

Microsoft has taken legal action to combat the spread of malware that the company says can be traced to bad actors in Kuwait and Algeria. READ MORE

Google launches 'cookie choices' site to let Europeans know how they're being tracked

Google has launched a new site, CookieChoices.org, to help visitors of European sites learn more about the digital breadcrumbs they leave behind through cookies. READ MORE

Databricks takes on Google streaming analysis with Spark

Taking on Google, Databricks plans to offer its own cloud service for analyzing live data streams, one based on the Apache Spark software. READ MORE

Resource compliments of: Akamai and Verizon

How to avoid Application Delivery Controller Sprawl

Today's workforce is dispersed and uses multiple devices to stay productive. It's up to enterprises to ensure their business critical applications are delivered quickly, reliably, and securely. Enterprises are looking beyond traditional approaches to application delivery, relying more on cloud-based services which put applications closer to users. Download the Neovise Respective Report today and learn: How the Internet is taking a greater role in the delivery of applications/service, and Akamai solutions which address performance, reliability, and security concerns.

Lenovo/IBM deal in danger due to politics

The spy accusations between the US and China are screwing up the deal. READ MORE

Samsung finds labor violations at Chinese suppliers

Dozens of China-based suppliers to Samsung Electronics violated various labor regulations last year, including failing to pay overtime wages and provide proper safety equipment for workers, according to recent audits. READ MORE

Energy providers hacked through malicious software updates

Eastern European-based attackers gained access to the networks of energy providers by tampering with software updates for industrial control systems, gaining a foothold that could be used for sabotage, Symantec said Monday. READ MORE

Razer's Project Christine modular PC struggling to find OEM partner support

Razer first showed Project Christine as a concept at CES 2014. READ MORE

White Paper: Panduit Corp.

Optimizing the Energy Efficiency of the Modern Data Center

Rising energy costs, needs around energy efficiencies, increased compute densities, and big data demands are driving data center managers to conserve electricity and make the most of what they expend. Learn More

GIVEAWAYS:

July's giveaways are here. Enter now for your chance to win!

App Accomplished: Strategies for App Development Success
Whether you're writing your own code or contracting out, you'll find hard-won guidance for your entire mobile app development life cycle. Five will win. Enter now!

SQL Queries for Mere Mortals: A Hands-On Guide to Data Manipulation in SQL
The clearest, simplest tutorial on writing effective SQL queries. Five will win. Enter now!

DON'T MISS...

Ringing a bell: 11 common phrases and terms that came from obsolete technology

IT salaries for the 20 hottest tech skills

Quick Look: Ubuntu GNOME 14.04

Haunting photos of a village built to handle electronic waste

Willkommen software engineers! 10 countries that pay you what you're worth

Follow ITworld

Share this email

You are currently subscribed to itworld_today as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments: