High-tech

High-tech
Light

Friday, June 27, 2014

iPhone 6 rumor rollup for the week ending June 27

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jun 27, 2014 2:01 PM
Subject: iPhone 6 rumor rollup for the week ending June 27
To: <aquarianm@gmail.com>
Cc:

Maître d' to Benioff: No lunch for you

How to protect yourself against privileged user abuse

Network World Daily News PM
June 27, 2014
Share this email

iPhone 6 rumor rollup for the week ending June 27

With the start of summer in June, we can now count the days until it ends in September with the expected unveiling of the iPhone 6. Pavlovian-like, the iOSphere seemed to salivate over a renewed spate of rumors, as if hearing them for the first time.

READ MORE
 

Issue highlights

1. Maître d' to Benioff: No lunch for you

2. How to protect yourself against privileged user abuse

3. FBI warns businesses "Man-in-the-E-Mail" scam escalating

4. Advice for college students seeking a tech career: Turn to internships

5. Microsoft admits communications, tech problems during Office 365 outages

6. Why are phishers targeting gamers? 'Cause that's where the money is …

7. Rare SMS worm targets Android devices

8. The top 10 Windows 8 questions everyone asks

9. Reports: German government to drop Verizon because of U.S. spying

10. Facebook tries to recover bulk user data seized by New York law enforcement

RESOURCE COMPLIMENTS OF: PC Connection, Inc.

Need to justify a storage refresh? Get SMART, get started.

Storage modernization unlocks the full potential of your data center. It increases capacity, boosts performance, and reduces costs per gigabyte. Take an educated look at storage with our three-level S.M.A.R.T. methodology. Learn how to create a cost effective model with unrivaled flexibility with our Storage Modernization and Refresh Toolkit. Click to continue

Maître d' to Benioff: No lunch for you

As his tweet above indicates, billionaire Salesforce.com CEO Marc Benioff was deemed unworthy of lunch today by the maître d' of a Paris restaurant.Benioff did not share the offered reason with his 107,000 Twitter followers, so a few of them felt free to speculate and offer advice: "There's a height limit?" (Benioff is tall; I've seen him described as 6-foot-5.) "Wearing sneakers?" "Gotta be dress code. Those Parisians make exceptions for nobody." "The @richardbranson model for such situations is to just buy the place :-)."  The "real life Seinfeld" reference, in case you didn't know, is a nod to the notorious "Soup Nazi."To read this article in full or to leave a comment, please click here READ MORE

How to protect yourself against privileged user abuse

The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees. READ MORE

FBI warns businesses "Man-in-the-E-Mail" scam escalating

The FBI and Internet Crime Complaint Center (IC3) are warning businesses to be on the lookout for growing scam that tricks them into paying invoices from established that look legitimate but in fact are fraudulent.The FBI says the scam is a tweak of the timeworn "man-in-the-middle" scam and usually involves chief technology officers, chief financial officers, or comptrollers, receiving an e-mail via their business accounts purportedly from a vendor requesting a wire transfer to a designated bank account, the FBI said. +More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2013+To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Radware

ITaaS and Virtual Application Delivery Infrastructure

Cost reduction, business agility and operational efficiency: three main drivers for any CIO considering the adoption of cloud computing and virtualization technologies as part of an IT-as-a-service initiative. Learn More

Advice for college students seeking a tech career: Turn to internships

When Katie Smith interned with Capital One, she expected to spend the summer fetching beverages for her manager—instead, she started on a career path that led to a full-time IT job at the banking and financial services company."I thought I would be getting coffee for my manager or, in my manager's case, Mountain Dew," said Smith, who interned as a business systems analyst in 2012 before starting her senior year at Carnegie Mellon University in Pittsburgh. "I wasn't doing that at all. I was actually contributing and my work was used by senior directors."Smith's positive experience at Capital One led her to "try something new and take a risk," accepting a job with the company in McLean, Virginia, after graduation rather than pursuing a master's degree in materials engineering. Last summer, Smith, who holds dual degrees in materials engineering and biomedical engineering, began working as a business systems analyst on the Web analytics team. That role exposed Smith to Web and mobile programming, which, she discovered, shared traits with engineering.To read this article in full or to leave a comment, please click here READ MORE

Microsoft admits communications, tech problems during Office 365 outages

Lync Online and Exchange Online went down for hours in separate incidents earlier this week READ MORE

Why are phishers targeting gamers? 'Cause that's where the money is …

There's a story that when the notorious bank robber "Slick Willie" Sutton was asked why he robbed banks he replied "Because that's where the money is"(see Sutton's Law). As a strategy for maximizing the potential "take home" Sutton was, if you'll forgive the pun, right on the money even if the risk was higher than, say, knocking over a supermarket.So, if you're a black hat hacker in the 21st Century who do you go after? Not the banks, they have defenses that are (usually) far too much work to penetrate. Nope, you look for a softer target, one that is less sophisticated, more numerous, and has a lower risk. That target would be gamers who rack up staggering numbers of visits to Web sites (the top 15 Web sites currently get around 121.85 million visits per month …and those are long visits).To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

IT Friction and Your Organization

This report outlines key issues that cause friction between business users and IT. Learn More

Rare SMS worm targets Android devices

A rare Android worm that propagates itself to other users via links in text messages has been discovered by security researchers.Once installed on a device, the malware, which was dubbed Selfmite, sends a text messages to 20 contacts from the device owner's address book.Most malware programs for Android are Trojan apps with no self-propagation mechanisms that get distributed from non-official app stores. Android SMS worms are rare, but Selfmite is the second such threat discovered in the past two months, suggesting that their number might grow in the future.To read this article in full or to leave a comment, please click here READ MORE

The top 10 Windows 8 questions everyone asks

You've finally made the leap to Windows 8 (or, more probably, Windows 8.1), and a pretty big leap it was. Everything looks different. Everything acts differently. Even a simple task like shutting down your PC suddenly becomes a challenge.We know. We've lived through Windows 8, too, and we've received many, many questions about it. Here are the 10 most common ones we hear about Microsoft's latest operating system. With these answers under your belt, you can consider yourself well past the beginner stage.1. What's the differences between Windows 8, Windows 8.1, and the Windows 8.1 Update? To start the confusion, there are three versions of Windows 8:To read this article in full or to leave a comment, please click here READ MORE

Reports: German government to drop Verizon because of U.S. spying

The German government is reportedly dropping Verizon Communications as a service provider because of worries about U.S. spying.The government will shift all services provided by Verizon to Deutsche Telekom by the end of 2015. It had been reviewing its communications contracts already, but concerns about possible spying by the U.S. National Security Agency helped to tip the scales against Verizon, the Wall Street Journal and other news outlets reported.Germany's move is the latest evidence that revelations about NSA eavesdropping are damaging U.S. companies' overseas business.Verizon provides Internet access to some German federal agencies and helps to run a network that links them, the Journal said. The government's contracts with Verizon had been exposed recently in the media and caused an uproar because of reports of NSA eavesdropping on foreign leaders, including German Chancellor Angela Merkel. Those reports, based on information disclosed by former NSA contractor Edward Snowden, brought additional scrutiny to Verizon's government contracts.To read this article in full or to leave a comment, please click here READ MORE

Facebook tries to recover bulk user data seized by New York law enforcement

Facebook user data in bulk was sought last year by the New York County District Attorney's office and a court directed it to produce virtually all records and communications for 381 accounts, the company disclosed Thursday.The social networking giant is now asking the court for the return or destruction of the data as well as a ruling on whether the bulk warrants violated the Fourth Amendment to the U.S. Constitution and other laws. The Fourth Amendment prohibits unreasonable searches and seizures of property.The company said that since last July it has been fighting a set of sweeping search warrants issued by the Supreme Court for New York County that demanded that it turn over to law enforcement nearly all data from the accounts of the 381 people, including photos, private messages and other information.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: HP

Protecting Your Mid-Size Business from Security Threats

Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. Learn More

SLIDESHOWS

5 potential Facebook killers

Outside of the obvious suspects – LinkedIn, Twitter and Google+ – who has the potential to unseat Facebook? Here are five possibilities.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 Bad Coding Practices That Wreck Software Development Projects

2. 17 obscure Windows tools and tricks too powerful to overlook

3. Microsoft botched all aspects of Exchange outage

4. 10 things to know about the smartphone kill switch

5. Comparing the top Hadoop distributions

6. Hackers found controlling malware and botnets from the cloud

7. Carnegie Mellon system lets you get to the good parts of video, fast

8. 8 Internet things that are not IoT

9. Apple hires lead software engineer from Atlas Wearable

10. SDN: The next steps

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment