Network World Daily News PM | | With the start of summer in June, we can now count the days until it ends in September with the expected unveiling of the iPhone 6. Pavlovian-like, the iOSphere seemed to salivate over a renewed spate of rumors, as if hearing them for the first time. | | Issue highlights 1. Maître d' to Benioff: No lunch for you 2. How to protect yourself against privileged user abuse 3. FBI warns businesses "Man-in-the-E-Mail" scam escalating 4. Advice for college students seeking a tech career: Turn to internships 5. Microsoft admits communications, tech problems during Office 365 outages 6. Why are phishers targeting gamers? 'Cause that's where the money is … 7. Rare SMS worm targets Android devices 8. The top 10 Windows 8 questions everyone asks 9. Reports: German government to drop Verizon because of U.S. spying 10. Facebook tries to recover bulk user data seized by New York law enforcement | RESOURCE COMPLIMENTS OF: PC Connection, Inc. Storage modernization unlocks the full potential of your data center. It increases capacity, boosts performance, and reduces costs per gigabyte. Take an educated look at storage with our three-level S.M.A.R.T. methodology. Learn how to create a cost effective model with unrivaled flexibility with our Storage Modernization and Refresh Toolkit. Click to continue | As his tweet above indicates, billionaire Salesforce.com CEO Marc Benioff was deemed unworthy of lunch today by the maître d' of a Paris restaurant.Benioff did not share the offered reason with his 107,000 Twitter followers, so a few of them felt free to speculate and offer advice: "There's a height limit?" (Benioff is tall; I've seen him described as 6-foot-5.) "Wearing sneakers?" "Gotta be dress code. Those Parisians make exceptions for nobody." "The @richardbranson model for such situations is to just buy the place :-)." The "real life Seinfeld" reference, in case you didn't know, is a nod to the notorious "Soup Nazi."To read this article in full or to leave a comment, please click here READ MORE | The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees. READ MORE | The FBI and Internet Crime Complaint Center (IC3) are warning businesses to be on the lookout for growing scam that tricks them into paying invoices from established that look legitimate but in fact are fraudulent.The FBI says the scam is a tweak of the timeworn "man-in-the-middle" scam and usually involves chief technology officers, chief financial officers, or comptrollers, receiving an e-mail via their business accounts purportedly from a vendor requesting a wire transfer to a designated bank account, the FBI said. +More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2013+To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: Radware Cost reduction, business agility and operational efficiency: three main drivers for any CIO considering the adoption of cloud computing and virtualization technologies as part of an IT-as-a-service initiative. Learn More | When Katie Smith interned with Capital One, she expected to spend the summer fetching beverages for her manager—instead, she started on a career path that led to a full-time IT job at the banking and financial services company."I thought I would be getting coffee for my manager or, in my manager's case, Mountain Dew," said Smith, who interned as a business systems analyst in 2012 before starting her senior year at Carnegie Mellon University in Pittsburgh. "I wasn't doing that at all. I was actually contributing and my work was used by senior directors."Smith's positive experience at Capital One led her to "try something new and take a risk," accepting a job with the company in McLean, Virginia, after graduation rather than pursuing a master's degree in materials engineering. Last summer, Smith, who holds dual degrees in materials engineering and biomedical engineering, began working as a business systems analyst on the Web analytics team. That role exposed Smith to Web and mobile programming, which, she discovered, shared traits with engineering.To read this article in full or to leave a comment, please click here READ MORE | Lync Online and Exchange Online went down for hours in separate incidents earlier this week READ MORE | There's a story that when the notorious bank robber "Slick Willie" Sutton was asked why he robbed banks he replied "Because that's where the money is"(see Sutton's Law). As a strategy for maximizing the potential "take home" Sutton was, if you'll forgive the pun, right on the money even if the risk was higher than, say, knocking over a supermarket.So, if you're a black hat hacker in the 21st Century who do you go after? Not the banks, they have defenses that are (usually) far too much work to penetrate. Nope, you look for a softer target, one that is less sophisticated, more numerous, and has a lower risk. That target would be gamers who rack up staggering numbers of visits to Web sites (the top 15 Web sites currently get around 121.85 million visits per month …and those are long visits).To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: BMC Software This report outlines key issues that cause friction between business users and IT. Learn More | A rare Android worm that propagates itself to other users via links in text messages has been discovered by security researchers.Once installed on a device, the malware, which was dubbed Selfmite, sends a text messages to 20 contacts from the device owner's address book.Most malware programs for Android are Trojan apps with no self-propagation mechanisms that get distributed from non-official app stores. Android SMS worms are rare, but Selfmite is the second such threat discovered in the past two months, suggesting that their number might grow in the future.To read this article in full or to leave a comment, please click here READ MORE | You've finally made the leap to Windows 8 (or, more probably, Windows 8.1), and a pretty big leap it was. Everything looks different. Everything acts differently. Even a simple task like shutting down your PC suddenly becomes a challenge.We know. We've lived through Windows 8, too, and we've received many, many questions about it. Here are the 10 most common ones we hear about Microsoft's latest operating system. With these answers under your belt, you can consider yourself well past the beginner stage.1. What's the differences between Windows 8, Windows 8.1, and the Windows 8.1 Update? To start the confusion, there are three versions of Windows 8:To read this article in full or to leave a comment, please click here READ MORE | The German government is reportedly dropping Verizon Communications as a service provider because of worries about U.S. spying.The government will shift all services provided by Verizon to Deutsche Telekom by the end of 2015. It had been reviewing its communications contracts already, but concerns about possible spying by the U.S. National Security Agency helped to tip the scales against Verizon, the Wall Street Journal and other news outlets reported.Germany's move is the latest evidence that revelations about NSA eavesdropping are damaging U.S. companies' overseas business.Verizon provides Internet access to some German federal agencies and helps to run a network that links them, the Journal said. The government's contracts with Verizon had been exposed recently in the media and caused an uproar because of reports of NSA eavesdropping on foreign leaders, including German Chancellor Angela Merkel. Those reports, based on information disclosed by former NSA contractor Edward Snowden, brought additional scrutiny to Verizon's government contracts.To read this article in full or to leave a comment, please click here READ MORE | Facebook user data in bulk was sought last year by the New York County District Attorney's office and a court directed it to produce virtually all records and communications for 381 accounts, the company disclosed Thursday.The social networking giant is now asking the court for the return or destruction of the data as well as a ruling on whether the bulk warrants violated the Fourth Amendment to the U.S. Constitution and other laws. The Fourth Amendment prohibits unreasonable searches and seizures of property.The company said that since last July it has been fighting a set of sweeping search warrants issued by the Supreme Court for New York County that demanded that it turn over to law enforcement nearly all data from the accounts of the 381 people, including photos, private messages and other information.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: HP Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. Learn More | | | | | | | |
No comments:
Post a Comment