High-tech

High-tech
Light

Wednesday, June 25, 2014

Warrants needed for cellphone searches, Supreme Court rules

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jun 25, 2014 2:02 PM
Subject: Warrants needed for cellphone searches, Supreme Court rules
To: <aquarianm@gmail.com>
Cc:

Securing the virtual world

Google previews upcoming Android 'L' release

Network World Daily News PM
June 25, 2014
Share this email

Warrants needed for cellphone searches, Supreme Court rules

Police must obtain warrants to search cellphones and smartphones when they are making arrests, the U.S. Supreme Court has ruled in a unanimous decision.The ruling involves two separate cases from Massachusetts and California, with the decision weighing heavily in favor of privacy rights."Privacy comes at a cost," Chief Justice John Roberts wrote, after noting that the court "cannot deny" that the decision will have an effect on police.(More to follow.) To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. Securing the virtual world

2. Google previews upcoming Android 'L' release

3. Google moves to cut prices of Android smartphones to under $100

4. Researchers bypass PayPal's two-factor authentication system

5. Intel's mood-capturing 3D camera will be in tablets early next year

6. Foxconn CEO blames past worker suicides on breakups, family disputes

7. SDN: The next steps

8. Microsoft turns cloud storage into Office 365 feature

9. Fewer NTP servers can be abused to amplify DDoS attacks, but threat remains

10. SDN: The next steps

11. 10 tech support requests you never want to hear from your family

WHITE PAPER: CDW

It's who you know: CDW + Microsoft Business Intelligence

That's why we partner with industry leaders like Microsoft. Their integrated suite of Business Intelligence solutions helps interpret data for small workgroups and large organizations alike. And through our strong partnership with Microsoft, CDW has the software and licensing expertise to find the right BI solutions for you. View Now

Securing the virtual world

Catbird Networks Director of Product Management, Malcolm Reike, talks about how virtualization changes the security game with Network World Editor in Chief John Dix. READ MORE

Google previews upcoming Android 'L' release

Google gave several thousand developers and a global Internet audience a preview of the next version of its Android operating system Wednesday as it opened its I/O conference in San Francisco.The upcoming release, which Google called the "biggest release in the history of Android," includes hundreds of enhancements and new features and will go head-to-head with Apple's iOS 8, which is launching later this year.A user of the new OS won't necessarily be prompted to enter their PIN or password every time they pick up their phone. The software will allow users to set trusted locations—places like a home—where authentication isn't required.The phone will determine where it is by the presence of Wi-Fi or Bluetooth signals so, for instance, if a home Wi-Fi network is within range, the phone won't prompt the user for a password. This removes the need to repeatedly enter a password when the phone is in an environment where it's likely under the owner's control.To read this article in full or to leave a comment, please click here READ MORE

Google moves to cut prices of Android smartphones to under $100

Google wants to cut prices on Android smartphones to under US$100 and is providing a reference design so handset makers can reach that price.The smartphone reference design will be available to device makers as part of a program called Android One, announced Wednesday by Sundar Pichai, senior vice president of Android, Chrome and Apps, during a keynote at the Google I/O conference in San Francisco.The smartphone has a 4.5-inch screen, dual SIM, SD card slots and FM radio. The first handsets coming out of the program will be in India, where Google is working with Micromax, Carbon and Spice.The phones will come with stock Android and Google Play. The software will be automatically update and Google is working on adding more software features to the smartphones.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Radware

Assuring Web Performance Levels With Next Generation ADCs

Next generation application delivery controllers (ADCs) accelerate applications, monitor end-to-end performance in real time, ensure their security and dedicate system resources to them to ensure SLAs. Learn More

Researchers bypass PayPal's two-factor authentication system

PayPal was one of the first large online services providers to offer two-factor authentication to its users, but until recently the company's implementation had a loophole that could have allowed attackers to bypass this additional protection.Two-factor authentication (2FA) systems prevent hackers from misusing stolen user names and passwords by requiring an additional randomly generated security code during the authentication process. Depending on implementation, the secret codes can be generated using a special mobile application, can be received via text message or can be generated by a physical hardware device.According to researchers from 2FA provider Duo Security, the PayPal "Security Key" feature—which is what the payment service provider calls its two-factor authentication system—could have easily been bypassed until Monday through the company's mobile apps and API (application programming interface).To read this article in full or to leave a comment, please click here READ MORE

Intel's mood-capturing 3D camera will be in tablets early next year

A new 3D webcam for mobile devices from Intel that can assess facial expressions is slated to appear in some tablets early next year.Intel's depth-sensing RealSense 3D cameras will first go into Windows and Android tablets starting in the first quarter next year, said Achin Bhowmik, general manager and chief technology officer of perceptual computing at Intel. It will reach smartphones thereafter, though no specific date was provided.The mobile camera technology is derived from similar 3D cameras that will be in PCs starting late this year. Such cameras, combined with touch and voice recognition, will improve human interaction with tablets, Bhowmik said.To read this article in full or to leave a comment, please click here READ MORE

Foxconn CEO blames past worker suicides on breakups, family disputes

Four years after a string of suicides brought unwanted attention to his company, Foxconn Technology Group's CEO said none of the deaths had to do with poor working conditions at its factories."It wasn't because the workers were tired," Terry Gou said on Wednesday at the company's annual shareholders' meeting. "Some of it was because the work is monotonous, but 90 percent of it had to do with personal relationships or because of family disputes."In 2010, over a dozen Foxconn workers made suicide attempts, resulting in 14 deaths, according to labor watchdog groups. The suicides brought heavy scrutiny to Foxconn over the working conditions at its factories in China, where it assembles products for Apple, Hewlett-Packard, Nintendo and other big brands.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

Hybrid IT—A Low-Risk Path from On-Premise to ITaaS

IT as a Service (ITaaS) will transform future IT operations and service delivery. In the interim, Hybrid IT offers a rational, gradual approach in which some services move to SaaS while others remain on-premise. Learn More

SDN: The next steps

Software Defined Networking technology is maturing and there are several real world use cases, but for most shops it is still a question of figuring out how we get there from here. In this Network World special report we analyze the promise and the options:* Network Virtualization and SDN: A Reality Check A look at the key milestones in terms of the development of SDN, the types of SDN consumers that are emerging, and evaluation criteria.* Understanding SDN Vendor EcosystemsIn this piece we review how network vendors are building relationships across the industry around their SDN platforms, examining what they are trying to achieve and what it means for consumers.To read this article in full or to leave a comment, please click here READ MORE

Microsoft turns cloud storage into Office 365 feature

But will the free 1TB boost subscriptions? READ MORE

Fewer NTP servers can be abused to amplify DDoS attacks, but threat remains

The number of NTP (Network Time Protocol) servers that can be abused to amplify DDoS attacks has decreased dramatically this year, but the threat remains.DDoS (distributed denial of service) amplification is an attack technique that involves tricking insecure servers into flooding a target with unrequested data. The method works with several protocols, including DNS (Domain Name System), SNMP (Simple Network Management Protocol) and NTP, that are vulnerable to IP address spoofing by design.Attackers can send small requests with a forged source IP address to unprotected servers over these protocols to trigger the return of significantly larger responses to the spoofed address, which typically belongs to the intended victim.To read this article in full or to leave a comment, please click here READ MORE

SDN: The next steps

Software Defined Networking technology is maturing and there are several real world use cases, but for most shops it is still a question of figuring out how we get there from here. READ MORE

10 tech support requests you never want to hear from your family

"Image by Archiboldian licensed under CC BY 2.0If you're a techie it's likely that someone in your family will ask you a question about their cell phone, their computer, their iPad, their you-name-it … and not long after the whole family will use you as their personal tech support. You become the go-to guy for every tech question. I's hard to turn down a plea from your mother or sweet Aunt Mabel. While some problems are easily solved ("There's no 'any' key, Mom, it means just press any key") there are other questions that will make your blood run cold. Here are the worst of the worst family support requests. If you have favorite family support requests, please comment below then follow me on Twitter, App.net, and Facebook.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: APC by Schneider Electric

Infrastructure Management Software Improves Planning & Costs

This paper demonstrates, through a series of examples, how data center infrastructure management software tools can simplify operational processes, cut costs, and speed up information delivery. View more

SLIDESHOWS

5 potential Facebook killers

Outside of the obvious suspects – LinkedIn, Twitter and Google+ – who has the potential to unseat Facebook? Here are five possibilities.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Smooth like btrfs: Inside Facebook's Linux-powered infrastructure

2. Why One CIO Is Saying 'No' to BYOD

3. 10 tech support requests you never want to hear from your family

4. Hungry ants knock out FiOS service … again

5. Why Facebook's SDN switch won't affect Cisco's customers

6. A Wakeup Call for the Cloud

7. 10 things to know about the smartphone kill switch

8. 10 CEOs who took drastic pay cuts

9. Gartner: Top trends in IT security technology

10. The future of networking is a NOS on your choice of bare metal, says Cumulus Networks

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment