Search This Blog

Friday, July 11, 2014

Buckle up, Microsoft: Big culture shakeup is coming

Court case offers a peek at how H-1B-fueled discrimination works

International law enforcement operation disrupts Shylock banking malware

ITworld Today
July 11, 2014
Share this email

Nadella on Microsoft's culture change: 'Nothing is off the table'

Microsoft staffers worldwide should buckle their seat belts because a big culture shakeup is in the works at the company.

READ MORE
 

Issue highlights

1. Court case offers a peek at how H-1B-fueled discrimination works

2. International law enforcement operation disrupts Shylock banking malware

3. New docs show DHS was more worried about critical infrastructure flaw in '07 than it let on

4. Amazon seeks US exemption to test delivery drones

5. Source code for tiny 'Tinba' banking malware leaked

6. 5 key takeaways from Amazon's big cloud day

7. Malware hidden in Chinese inventory scanners targeted logistics, shipping firms

8. Google to tour Europe to discuss right-to-be-forgotten ruling

9. Crowdfunding jumps the shark [CARTOON]

White Paper: Pure Storage

How Flash Storage Changes Everything

Pure Storage set out with a simple mission: to create a purpose-built storage array that overcomes these barriers. The result is the Pure Storage FlashArray and its tightly-coupled software, the Purity Operating Environment. Learn more!

Court case offers a peek at how H-1B-fueled discrimination works

One-third of Infosys worksites have 100% Asian workers, lawsuit alleges. READ MORE

International law enforcement operation disrupts Shylock banking malware

Police from eight countries together with several private security companies disrupted the online infrastructure used by cybercriminals to control computers infected with a malware program called Shylock. READ MORE

New docs show DHS was more worried about critical infrastructure flaw in '07 than it let on

The Department of Homeland Security mistakenly released details on an experiment in which a 27-ton generator was destroyed via a cyberattack. READ MORE

Amazon seeks US exemption to test delivery drones

Amazon.com has asked the U.S. Federal Aviation Administration permission to test drones outdoors for use in its Prime Air package delivery service. READ MORE

White Paper: Pure Storage

San Jose Sharks Score Big With Pure Storage

Find out how the San Jose Sharks minimized latency and data deduplication rates up to 12:1 for VDI deployment. Learn more!

Source code for tiny 'Tinba' banking malware leaked

The source code for an impressively small but capable malware program that targets online bank accounts has been leaked, according to CSIS Security Group of Denmark. READ MORE

5 key takeaways from Amazon's big cloud day

Amazon challenges Box with file share services, attempts to woo mobile app developers. READ MORE

Malware hidden in Chinese inventory scanners targeted logistics, shipping firms

Financial and business information was stolen from several shipping and logistics firms by sophisticated malware hiding in inventory scanners manufactured by a Chinese company. READ MORE

Google to tour Europe to discuss right-to-be-forgotten ruling

Google is going to tour Europe with a band of external advisers this fall to discuss a landmark ruling by Europe's top court that gave people the right to have personal information excluded from search engine listings in Europe. READ MORE

Crowdfunding jumps the shark [CARTOON]

Will we see anything sillier than a Kickstarter campaign to make potato salad? Wait, don't answer that READ MORE

Webcast: IBM

The Next Generation of Big Data

Learn about IBM's new and expanded Information Management capabilities now delivered in the cloud. Learn More

GIVEAWAYS:

We've got 5 copies of each of these new books to give away to some lucky ITworld readers. Enter now for your chance to win!

App Accomplished: Strategies for App Development Success

SQL Queries for Mere Mortals: A Hands-On Guide to Data Manipulation in SQL

DON'T MISS...

Enterprise mobility management: Tools to create a secure and scalable mobile experience
Your goal is to choose a solution that addresses increasingly powerful mobile devices, demanding users and complex security challenges. To get you started, take a look at the key players in the market, the important differentiators of each solution and the top questions to ask. Go now!

Ringing a bell: 11 common phrases and terms that came from obsolete technology

IT salaries for the 20 hottest tech skills

Quick Look: Ubuntu GNOME 14.04

Haunting photos of a village built to handle electronic waste

Willkommen software engineers! 10 countries that pay you what you're worth

Follow ITworld

Share this email

You are currently subscribed to itworld_today as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments: