High-tech

High-tech
Light

Thursday, October 2, 2014

10 creepy mobile apps that make spying easier

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Oct 1, 2014 9:13 PM
Subject: 10 creepy mobile apps that make spying easier
To: <aquarianm@gmail.com>
Cc:

  DARPA technology uncovers counterfeit microchips | McAfee's most dangerous cyber celebrities of 2014

 
  Network World After Dark  

10 creepy mobile apps that make spying easier
This week, the U.S. Justice Department indicted the CEO of StealthGenie on charges that the company's apps violate federal laws against invading others' privacy, an arrest the government has called the first of its kind. However, StealthGenie is hardly the only company that has developed tools that turn communications devices into tools for spying, stalking, and digging up information on other people. Here are 10 of the creepiest mobile apps, some of which are still available for download, but might not be for long if the prosecution against StealthGenie is successful.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Coresite

4 Advantages of Multi-Tenant Data Centers
Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded them by outsourced cloud solutions, which can provide exponential cost savings. Learn More >>

WHITE PAPER: IBM

Magic Quadrant for Data Masking Technology
IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. Gartner reports that data masking should be mandatory for enterprises using copies of sensitive production data for application development, analytics or training. Read the full report to learn about IBM. Learn more!

DARPA technology uncovers counterfeit microchips
Any counterfeit high-tech goods are a serious safety threat to people and cybersecurity as well as a problem for system reliability and performance. The Defense Advanced Research Projects Agency said this week one of its contractors, working on one of the agency's anti-counterfeit projects has developed and deployed what it calls an Advanced Scanning Optical Microscope that can scan integrated circuits by using an extremely narrow infrared laser beam, to probe microelectronic circuits at nanometer levels, revealing information about chip construction as well as the function of circuits at the transistor level.To read this article in full or to leave a comment, please click here Read More
 

McAfee's most dangerous cyber celebrities of 2014
McAfee has revealed its 2014 list of the Most Dangerous Cyber Celebrities – those whose names are most likely to lead you into online trouble if you search on them. You're safe cruising through this slideshow though…To read this article in full or to leave a comment, please click here Read More
 

Why did Ellison apologize? He's not sorry
Oracle boss Larry Ellison issued a classic non-apology apology yesterday at his company's OpenWorld conference. Here's what he said."A year ago, I was a no-show at this conference on Tuesday. So I'd like to take an opportunity to apologize to everybody, but we were desperately trying to come back from an 8-to-1 deficit in the America's Cup and every day was sudden death but somehow we made it. So, again, apologies."Apologies for what?It would seem that he is apologizing merely for his inability to be in two places at the same time.To read this article in full or to leave a comment, please click here Read More
 

IT pros should pay attention to 'shadow IT,' Interop NY keynoters urge
Interop New York speakers opened the conference with a provocative message: Instead of ignoring "shadow IT" in their organizations, IT pros should try to understand what they are failing to deliver that workers wind up taking care of themselves."Shadow IT is an opportunity to become closer to our business and to build a culture of collaboration," said Steve Comstock, who was recently appointed CIO for CBS Interactive, the online content division for the CBS television network. Shadow IT, also often called bring-your-own-IT or BYOD, is the practice of employees procuring their own IT resources, without going through the appropriate organizational channels.To read this article in full or to leave a comment, please click here Read More
 

4 Cool Free Tech Tools & Services Announced This Week
I'm a sucker for "free" in headlines, and of course that's what the vendors that this week have rolled out freebies are counting on (as am I, in getting you to read this of course).Not that I'm going to jump on all these offers myself, but I figured I'd at least pass them along to all of you for consideration.As always, getting something for nothing is rare, and in the tech world, it usually means you're going to get nudged to upgrade at some point if you want the really good stuff...1. Google's new Drive for Education is an extension to its free Apps for Education offering, which includes collaborative email, calendaring and document services. What Drive brings is unlimited storage, including for files up to 5TB in size, to the 30 million students and educators that Google claims to have on Apps for Education.  To boot, compliance and auditing tools are included. Of course, what Google gives it can also take away, as the ever-growing Google Graveyard shows.To read this article in full or to leave a comment, please click here Read More
 

Will Windows 10 address the operating system's biggest weakness?
The real question on my mind is whether Windows 10 will finally address a problem that has plagued pretty much every Windows OS since at least 95: the decay of the system over time. As you add and remove apps, as Windows writes more and more temporary and junk files, over time, a system just slows down. Read More
 

Xen Project discloses serious vulnerability that impacts virtualized servers
The Xen Project has revealed the details of a serious vulnerability in the Xen hypervisor that could put the security of many virtualized servers at risk.Xen is a free, open-source hypervisor used to create and run virtual machines. It is widely used by cloud computing providers and virtual private server hosting companies.The security vulnerability, which is being tracked as CVE-2014-7188 and was privately disclosed to major cloud providers in advance, forced at least Amazon Web Services and Rackspace to reboot some of their customers' virtualized servers over the past week.The issue allows a virtual machine created using Xen's hardware-assisted virtualization (HVM) to read data stored by other HVM guests that share the same physical hardware. This breaks an important security barrier in multi-tenant virtual environments.To read this article in full or to leave a comment, please click here Read More
 

How to get Windows 10's best new features today
Windows 9? Fuhgeddaboutit. Microsoft skipped that digit and jumped straight to Windows 10 for the next-gen version of its operating system. Revealed at a preview event on September 30, Windows 10 aims to atone for the sins of Windows 8 by wooing PC power users with a mix of compromise and outright bribery.  Further reading: Hands-on with Microsoft's new Windows 10: UI changes that look great at first blushTo read this article in full or to leave a comment, please click here Read More
 

FCC takes steps to make room for 'white spaces,' wireless microphones
The U.S. Federal Communications Commission is taking steps to ensure that both current and emerging wireless devices don't get left out when it reorganizes the frequency bands now used for television.On Tuesday, the agency proposed actions on wireless microphones and on new devices and services that use the so-called "white spaces" between TV channels. Both types of devices use TV bands and will be left with less spectrum following the FCC's upcoming incentive auction intended to shift some TV spectrum to mobile services.To read this article in full or to leave a comment, please click here Read More
 

ARM builds an OS for the Internet of Things
Chip design company ARM is stepping outside its area of expertise to release a new operating system that could play a big role in building out the Internet of Things.Called mbed OS, the operating system aims to provide a common software layer for securing and connecting the mass of devices expected to be hooked up to networks in the coming years, ranging from streetlights and gas meters to home appliances and pacemakers.MORE ON NETWORK WORLD: 12 most powerful Internet of Things companies Along with the OS, ARM plans to sell a piece of back-end software, called the mbed Device Server, that companies will use to collect data from IoT devices and make the data available for use by other services, such as analytics programs.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

First Look: BlackBerry Passport

The Passport is uniquely focused on being a device for work first and personal stuff second - take a look at how it's turned out.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES of 2014

1. First look: Windows 10

2. America's richest techies

3. Windows 10 revealed: Microsoft's next OS fuses Windows 7 and 8

4. 3 … 2 … 1 … That's all for Lotus 1-2-3

5. IT skills that are in demand, and those that will be

6. Cisco, Oracle find dozens of their products affected

7. How to get Windows 10's best new features today

8. 12 tips to tune your Wi-Fi network

9. How one user (successfully) managed the Amazon cloud reboot

10. Sorriest technology companies of 2014


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment