Search This Blog

Wednesday, July 02, 2014

Microsoft legal action cramping other hacking campaigns, Kaspersky says

Find out what's draining your battery with Windows 8's Sleep Study

Microsoft legal action cramping other hacking campaigns, Kaspersky says

ITworld Today
July 02, 2014
Share this email

BOOK GIVEAWAY: App Accomplished: Strategies for App Development Success

Whether you're writing your own code or contracting out, you'll find hard-won guidance for your entire mobile app development life cycle. Five will win. Enter the drawing today!

READ MORE
 

Issue highlights

1. Find out what's draining your battery with Windows 8's Sleep Study

2. Microsoft legal action cramping other hacking campaigns, Kaspersky says

3. ISPs sue UK spooks over network spying

4. Oracle selling $10 billion in bonds, giving hint to buying spree

5. Microsoft boosts anti-snooping protection in Outlook.com, OneDrive

6. Amazon customizes low-cost instances for remote desktops, databases

7. Microsoft to resume email-based security notifications

8. Bugcrowd adds 'flex' pricing model to bug-bounty programs

9. OS X 10.9.4 update fixes Wi-Fi network issue, includes Safari 7.0.5

10. Microsoft admits technical error in IP takeover, but No-IP still down

11. EFF sues the NSA to disclose use of software security flaws

12. Quick Look: Peppermint Five

13. 10 tips for successful a phone interview

Resource compliments of: Akamai and Verizon

How to avoid Application Delivery Controller Sprawl

Today's workforce is dispersed and uses multiple devices to stay productive. It's up to enterprises to ensure their business critical applications are delivered quickly, reliably, and securely. Enterprises are looking beyond traditional approaches to application delivery, relying more on cloud-based services which put applications closer to users. Download the Neovise Respective Report today and learn: How the Internet is taking a greater role in the delivery of applications/service, and Akamai solutions which address performance, reliability, and security concerns.

Find out what's draining your battery with Windows 8's Sleep Study

The new tool diagnoses what's using your battery life, while your computer sleeps READ MORE

Microsoft legal action cramping other hacking campaigns, Kaspersky says

Microsoft's seizure of domains from a DNS service provider has also disrupted some state-sponsored cyberespionage campaigns, according to security vendor Kaspersky Lab. READ MORE

ISPs sue UK spooks over network spying

A coalition of ISPs and communication providers from around the world filed a legal complaint against the U.K. Government Communications Headquarters (GCHQ), calling for an end to its alleged attacking and exploitation of network infrastructure to gain access to potentially millions of people's private communications. READ MORE

Oracle selling $10 billion in bonds, giving hint to buying spree

Oracle is selling US$10 billion in bonds, in a move that could signal the vendor is planning to ramp up its already steady pace of acquisitions. READ MORE

Microsoft boosts anti-snooping protection in Outlook.com, OneDrive

Microsoft has added encryption safeguards to the Outlook.com webmail service and to the OneDrive cloud storage service, in part to better protect these consumer products from government snoops. READ MORE

Amazon customizes low-cost instances for remote desktops, databases

Amazon Web Service has launched a type of instance to reduce costs for hosted remote desktops and small databases that don't consistently use high levels of CPU power, but every now and then need better performance. READ MORE

Webcast: CA Technologies

The End of Data Protection As We Know It.

A fundamental change is necessary to fix data protection. It requires the adoption of a modern architecture that has been designed to solve today's complex problems, as well as provide a highly scalable platform for the future. Learn more!

Microsoft to resume email-based security notifications

Microsoft has backtracked on a plan to stop sending email-based notifications about security bulletins starting this month. READ MORE

Bugcrowd adds 'flex' pricing model to bug-bounty programs

Idea is to get security researchers to vie to find unknown vulnerabilities in software. READ MORE

OS X 10.9.4 update fixes Wi-Fi network issue, includes Safari 7.0.5

It never rains software update, but it pours. Apple on Monday released OS X Mavericks 10.9.4, incorporating a number of small fixes for the Mac OS, as well as patching some security holes. Apple also released iOS 7.1.2. READ MORE

Microsoft admits technical error in IP takeover, but No-IP still down

Microsoft admitted Tuesday it made a technical error after it commandeered part of an Internet service's network in order to shut down a botnet, but the Nevada-based company says its services are still down. READ MORE

EFF sues the NSA to disclose use of software security flaws

The Electronic Frontier Foundation, a prominent digital privacy rights group, has filed a lawsuit against the U.S. National Security Agency to get it to specify the extent to which it might exploit software security flaws. READ MORE

Quick Look: Peppermint Five

Peppermint Five adds a new Control Center for settings, a rewritten Ice SSB manager, and long-term support via the Ubuntu 14.04 code base. READ MORE

10 tips for successful a phone interview

Help! My resume looks great, my job experience is right on target, and I have great references. My problem is whenever I do a phone-based interview or job screening, they never call me back. How can I improve my phone-based interviews? READ MORE

White Paper: New Relic

5 Unsung Tools of DevOps

In this eBook you'll find the top five DevOps tools you should be using and how to use them. Learn more!

GIVEAWAYS:

July's giveaways are here. Enter now for your chance to win!

App Accomplished: Strategies for App Development Success
Whether you're writing your own code or contracting out, you'll find hard-won guidance for your entire mobile app development life cycle. Five will win. Enter now!

SQL Queries for Mere Mortals: A Hands-On Guide to Data Manipulation in SQL
The clearest, simplest tutorial on writing effective SQL queries. Five will win. Enter now!

DON'T MISS...

Ringing a bell: 11 common phrases and terms that came from obsolete technology

IT salaries for the 20 hottest tech skills

Quick Look: Ubuntu GNOME 14.04

Haunting photos of a village built to handle electronic waste

Willkommen software engineers! 10 countries that pay you what you're worth

Follow ITworld

Share this email

You are currently subscribed to itworld_today as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments: