High-tech

High-tech
Light

Thursday, July 24, 2014

FIRST LOOK: Apple OS X Yosemite public beta

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jul 24, 2014 2:38 PM
Subject: FIRST LOOK: Apple OS X Yosemite public beta
To: <aquarianm@gmail.com>
Cc:

10 disturbing attacks at Black Hat USA 2014

Business leaders know: Let in the smartphones, tablets, laptops

Network World Daily News PM
July 24, 2014
Share this email

FIRST LOOK: Apple OS X Yosemite public beta

On Thursday, fall came early for hundreds of thousands of Mac users as Apple released its first public beta of OS X Yosemite.

READ MORE
 

Issue highlights

1. 10 disturbing attacks at Black Hat USA 2014

2. INSIDER Business leaders know: Let in the smartphones, tablets, laptops

3. US Social Security Administration spent nearly $300M on IT project 'boondoggle,' lawmakers say

4. FTC takes out "tech support" scammers; $5.1 million in fines, retribution

5. Are IT groups really ready for BYOD security challenges?

6. Roadkill app could save human, animal lives

7. Thousands of sites compromised through WordPress plug-in vulnerability

8. Malwarebytes questions poor showing in anti-malware protection-evaluation lab testing

9. Never stop learning, CIOs advise new IT grads

10. Hero hacks: 14 Raspberry Pi projects primed for IT

WHITE PAPER: Polycom

The New Business Case for Video Conferencing

This white paper provides insight into the value of video conferencing in today's business environment, and real-world examples of how organizations--large and small--are leveraging visual collaboration to find new clients, serve existing clients better, and improve their bottom line. Learn more >>

10 disturbing attacks at Black Hat USA 2014

Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets, more READ MORE

INSIDER

Business leaders know: Let in the smartphones, tablets, laptops

Kraft Foods, a forward-thinking giant when it comes to consumer taste, was anything but when it came to IT. Simply put, the company was mired in the old-school culture of rigid centralized information technology. Not anymore.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

US Social Security Administration spent nearly $300M on IT project 'boondoggle,' lawmakers say

The SSA may have also tried to temporarily keep a damaging report on the project secret, a House committee alleges READ MORE

WHITE PAPER: BMC Software

Meeting the Exploding Demand for New IT Services

In this eBook, explore the top trends driving the New IT for IT Service Management, and how leading organizations are evolving to focus on end-user experience. Learn More

FTC takes out "tech support" scammers; $5.1 million in fines, retribution

While a number of these scams still persist, the Federal Trade Commission today said it got a US District court to slap the operators of several international tech support rip-offs to pay more than $5.1 million in fines and retribution on charges they masqueraded as major computer companies, including Dell, Microsoft, McAfee, and Norton, to trick consumers into believing their computers were riddled with malware and then charge them to "fix" the "problems." The FTC said that the U.S. District Court for the Southern District of New York issued default judgments against fourteen corporate defendants and fourteen individual defendants that allegedly operated the tech support scams. The operations were mostly based in India and targeted English-speaking consumers in the United States and several other countries, the FTC stated.To read this article in full or to leave a comment, please click here READ MORE

Are IT groups really ready for BYOD security challenges?

A new survey of IT security professionals shows that many businesses are barely starting to exploit mobile technology, and some of them may be a mobile security nightmare waiting to happen.In a self-evaluation question, 40% of the 2014 sample (compared to 34% in 2013) ranked their readiness for BYOD at 60% or higher. Yet responses to other questions suggest that is wildly optimistic. + Also on NetworkWorld:7 Enterprise Mobile Security Best Practices|Slideshow: 7 security mistakes people make with their mobile device +To read this article in full or to leave a comment, please click here READ MORE

Roadkill app could save human, animal lives

Utah State University researchers are reporting on a new app designed to get a much better read on wildlife-vehicle collisions -- a serious situation that leaves a couple hundred people and about a million animals (vertebrates) in the United States each year. READ MORE

WHITE PAPER: APC by Schneider Electric

Containerized Power and Cooling Modules for Data Centers

This white paper compares the cost benefits of both Standardized and Containerized data center cooling infrastructures, presents the advantages and disadvantages of each, and identifies which environments can best leverage the facility module approach. Learn More

Thousands of sites compromised through WordPress plug-in vulnerability

Hackers are actively exploiting a vulnerability found recently in the MailPoet Newsletters plug-in for WordPress READ MORE

Malwarebytes questions poor showing in anti-malware protection-evaluation lab testing

Dennis Technology Labs (DTL), which tests anti-malware products for effectiveness in protection, for the first time included the free version of the Malwarebytes software in the labs' competitive evaluation along with nine other vendor products, both paid and free. The results published by DTL today reveal Malwarebytes Anti-Malware Free had a poor showing, with only Microsoft Security Essentials doing worse in terms of effectiveness of protection.In terms of DTL's "protection" ratings that score for accuracy in protecting against malware, the free version of Malwarebytes was scored at 63 based on how many times it prevented a threat from compromising the system. Only Microsoft Security Essentials did worse at a score of 56. By contrast, the products that scored the best in the DTL tests, Kaspersky Internet Security 2014 and Norton Internet Security, each scored 100. Other high scorers on "protection" included BitDefender Internet Security which earned a score of 94 as well as Avast! Free Antivirus and ESET Smart Security 7 which each scored 93.To read this article in full or to leave a comment, please click here READ MORE

Never stop learning, CIOs advise new IT grads

While the job market is healthy for IT pros, certain talents are more valuable than others, and it's wise to keep adding to your skills arsenal.That's the advice of IT veterans to newcomers in the field.Among 2,400 U.S. CIOs surveyed by Robert Half Technology, 50% said their best career advice for new grads entering the tech industry is to keep learning new skills and stay current in their field. Another 17% of respondents said they'd tell first-time job seekers to take any opportunity that will help them get a foot in the door with an employer.To read this article in full or to leave a comment, please click here READ MORE

Hero hacks: 14 Raspberry Pi projects primed for IT

VoIP PBXes, NTP servers, Web-controlled power strips -- hack together one of these handy, cheap solutions for the server closet and beyond READ MORE

WHITE PAPER: OutSystems

HTML5 Rocks

With the release of the 5th major version of HTML (aka HTML5), new features that mainly target Web Applications have been introduced, ranging from CSS3 (related technology) to GeoLocation and WebStorage. This article explores the top 5 features that developers should be using now. Read Now

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 16 weirdest places you'll find Linux

2. 16 terrible computer pranks that could get you fired

3. Superclass: 14 of the world's best living programmers

4. 17 obscure Windows tools and tricks too powerful to overlook

5. 20 cool things you can do with a Raspberry Pi

6. 10 disturbing attacks at Black Hat USA 2014

7. 10 Linux distros to watch in 2014

8. Whatever happened to the IPv4 address crisis?

9. 20 top Android and iOS productivity apps for 2014

10. Top 10 security tools in Kali Linux 1.0.6

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment