Network World Daily News PM | | Police must obtain warrants to search cellphones and smartphones when they are making arrests, the U.S. Supreme Court has ruled in a unanimous decision.The ruling involves two separate cases from Massachusetts and California, with the decision weighing heavily in favor of privacy rights."Privacy comes at a cost," Chief Justice John Roberts wrote, after noting that the court "cannot deny" that the decision will have an effect on police.(More to follow.) To read this article in full or to leave a comment, please click here | | Issue highlights 1. Securing the virtual world 2. Google previews upcoming Android 'L' release 3. Google moves to cut prices of Android smartphones to under $100 4. Researchers bypass PayPal's two-factor authentication system 5. Intel's mood-capturing 3D camera will be in tablets early next year 6. Foxconn CEO blames past worker suicides on breakups, family disputes 7. SDN: The next steps 8. Microsoft turns cloud storage into Office 365 feature 9. Fewer NTP servers can be abused to amplify DDoS attacks, but threat remains 10. SDN: The next steps 11. 10 tech support requests you never want to hear from your family | WHITE PAPER: CDW That's why we partner with industry leaders like Microsoft. Their integrated suite of Business Intelligence solutions helps interpret data for small workgroups and large organizations alike. And through our strong partnership with Microsoft, CDW has the software and licensing expertise to find the right BI solutions for you. View Now | Catbird Networks Director of Product Management, Malcolm Reike, talks about how virtualization changes the security game with Network World Editor in Chief John Dix. READ MORE | Google gave several thousand developers and a global Internet audience a preview of the next version of its Android operating system Wednesday as it opened its I/O conference in San Francisco.The upcoming release, which Google called the "biggest release in the history of Android," includes hundreds of enhancements and new features and will go head-to-head with Apple's iOS 8, which is launching later this year.A user of the new OS won't necessarily be prompted to enter their PIN or password every time they pick up their phone. The software will allow users to set trusted locations—places like a home—where authentication isn't required.The phone will determine where it is by the presence of Wi-Fi or Bluetooth signals so, for instance, if a home Wi-Fi network is within range, the phone won't prompt the user for a password. This removes the need to repeatedly enter a password when the phone is in an environment where it's likely under the owner's control.To read this article in full or to leave a comment, please click here READ MORE | Google wants to cut prices on Android smartphones to under US$100 and is providing a reference design so handset makers can reach that price.The smartphone reference design will be available to device makers as part of a program called Android One, announced Wednesday by Sundar Pichai, senior vice president of Android, Chrome and Apps, during a keynote at the Google I/O conference in San Francisco.The smartphone has a 4.5-inch screen, dual SIM, SD card slots and FM radio. The first handsets coming out of the program will be in India, where Google is working with Micromax, Carbon and Spice.The phones will come with stock Android and Google Play. The software will be automatically update and Google is working on adding more software features to the smartphones.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: Radware Next generation application delivery controllers (ADCs) accelerate applications, monitor end-to-end performance in real time, ensure their security and dedicate system resources to them to ensure SLAs. Learn More | PayPal was one of the first large online services providers to offer two-factor authentication to its users, but until recently the company's implementation had a loophole that could have allowed attackers to bypass this additional protection.Two-factor authentication (2FA) systems prevent hackers from misusing stolen user names and passwords by requiring an additional randomly generated security code during the authentication process. Depending on implementation, the secret codes can be generated using a special mobile application, can be received via text message or can be generated by a physical hardware device.According to researchers from 2FA provider Duo Security, the PayPal "Security Key" feature—which is what the payment service provider calls its two-factor authentication system—could have easily been bypassed until Monday through the company's mobile apps and API (application programming interface).To read this article in full or to leave a comment, please click here READ MORE | A new 3D webcam for mobile devices from Intel that can assess facial expressions is slated to appear in some tablets early next year.Intel's depth-sensing RealSense 3D cameras will first go into Windows and Android tablets starting in the first quarter next year, said Achin Bhowmik, general manager and chief technology officer of perceptual computing at Intel. It will reach smartphones thereafter, though no specific date was provided.The mobile camera technology is derived from similar 3D cameras that will be in PCs starting late this year. Such cameras, combined with touch and voice recognition, will improve human interaction with tablets, Bhowmik said.To read this article in full or to leave a comment, please click here READ MORE | Four years after a string of suicides brought unwanted attention to his company, Foxconn Technology Group's CEO said none of the deaths had to do with poor working conditions at its factories."It wasn't because the workers were tired," Terry Gou said on Wednesday at the company's annual shareholders' meeting. "Some of it was because the work is monotonous, but 90 percent of it had to do with personal relationships or because of family disputes."In 2010, over a dozen Foxconn workers made suicide attempts, resulting in 14 deaths, according to labor watchdog groups. The suicides brought heavy scrutiny to Foxconn over the working conditions at its factories in China, where it assembles products for Apple, Hewlett-Packard, Nintendo and other big brands.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: BMC Software IT as a Service (ITaaS) will transform future IT operations and service delivery. In the interim, Hybrid IT offers a rational, gradual approach in which some services move to SaaS while others remain on-premise. Learn More | Software Defined Networking technology is maturing and there are several real world use cases, but for most shops it is still a question of figuring out how we get there from here. In this Network World special report we analyze the promise and the options:* Network Virtualization and SDN: A Reality Check A look at the key milestones in terms of the development of SDN, the types of SDN consumers that are emerging, and evaluation criteria.* Understanding SDN Vendor EcosystemsIn this piece we review how network vendors are building relationships across the industry around their SDN platforms, examining what they are trying to achieve and what it means for consumers.To read this article in full or to leave a comment, please click here READ MORE | But will the free 1TB boost subscriptions? READ MORE | The number of NTP (Network Time Protocol) servers that can be abused to amplify DDoS attacks has decreased dramatically this year, but the threat remains.DDoS (distributed denial of service) amplification is an attack technique that involves tricking insecure servers into flooding a target with unrequested data. The method works with several protocols, including DNS (Domain Name System), SNMP (Simple Network Management Protocol) and NTP, that are vulnerable to IP address spoofing by design.Attackers can send small requests with a forged source IP address to unprotected servers over these protocols to trigger the return of significantly larger responses to the spoofed address, which typically belongs to the intended victim.To read this article in full or to leave a comment, please click here READ MORE | Software Defined Networking technology is maturing and there are several real world use cases, but for most shops it is still a question of figuring out how we get there from here. READ MORE | "Image by Archiboldian licensed under CC BY 2.0If you're a techie it's likely that someone in your family will ask you a question about their cell phone, their computer, their iPad, their you-name-it … and not long after the whole family will use you as their personal tech support. You become the go-to guy for every tech question. I's hard to turn down a plea from your mother or sweet Aunt Mabel. While some problems are easily solved ("There's no 'any' key, Mom, it means just press any key") there are other questions that will make your blood run cold. Here are the worst of the worst family support requests. If you have favorite family support requests, please comment below then follow me on Twitter, App.net, and Facebook.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: APC by Schneider Electric This paper demonstrates, through a series of examples, how data center infrastructure management software tools can simplify operational processes, cut costs, and speed up information delivery. View more | | | | | | | |
No comments:
Post a Comment