High-tech

High-tech
Light

Friday, November 28, 2014

Hacking Team surveillance malware masquerades as legitimate bookmark manager

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Nov 28, 2014 8:01 AM
Subject: Hacking Team surveillance malware masquerades as legitimate bookmark manager
To: <aquarianm@gmail.com>
Cc:

10 productivity gadgets to add to your holiday shopping list

Hackers suggest they had physical access during attack on Sony Pictures

Network World Daily News AM
November 28, 2014

Hacking Team surveillance malware masquerades as legitimate bookmark manager

Researchers found digitally signed spyware posing as a legitimate program called Outertech Linkman

READ MORE
 

Issue highlights

1. 10 productivity gadgets to add to your holiday shopping list

2. Hackers suggest they had physical access during attack on Sony Pictures

3. INSIDER Review: Spark Lights a Fire Under Big Data Processing

4. Fidelity's top IT exec sees potential in A.I.

5. New IBM service shines a light on mobile device and app performance

6. Google's gigabit-Internet service in Austin priced at $70 per month

7. Intel to tame passwords with biometric authentication

8. 11 technologies Apple has killed

9. Thwarting attackers with threat intelligence

10. Google quadruples Nobel Prize in Computing to $1M

: MoreDirect

Disaster Recovery Interactive eGuide

In this eGuide, Computerworld along with sister publications InfoWorld and CIO look at recent disaster recovery trends and offer expert opinions and advice. Read on to learn how the right disaster recovery efforts can protect your organization's data. Learn More

10 productivity gadgets to add to your holiday shopping list

Holiday Gadget Gift IdeasImage by ShutterstockIt's that time of the year again. You're probably looking for gifts for a loved one, friend or business associate – or maybe you're looking for a reward for yourself. This list of 10 gadgets will help the people on your holiday shopping list stay productive on the go, whether it's for business or personal travel.To read this article in full or to leave a comment, please click here READ MORE

Hackers suggest they had physical access during attack on Sony Pictures

On Monday, Sony Pictures was forced to disable their corporate network after attackers calling themselves the GOP (Guardians of Peace) hijacked employee workstations in order to threaten the entertainment giant. Now, new information suggests that the GOP had physical access to the network in order to accomplish their aims.According to employees, who continue to speak to Salted Hash on the condition that they names not be used, the corporate network is still offline as of Tuesday morning. VPN access is likewise unavailable. In many cases employees are resorting to using non-technical means as a way to accomplish their daily tasks.To read this article in full or to leave a comment, please click here READ MORE

INSIDER

Review: Spark Lights a Fire Under Big Data Processing

Apache Spark got its start in 2009 at UC Berkeley's AMPLab as a way to perform in-memory analytics on large data sets. At that time, Hadoop MapReduce was focused on large-scale data pipelines that were not iterative in nature. Building analytic models on MapReduce in 2009 was a very slow process, so AMPLab designed Spark to help developers perform interactive analysis of large data sets and to run iterative workloads, such as machine-learning algorithms, that repeatedly process the same data sets in RAM.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

: MoreDirect

Data Center Interactive eGuide

In this eGuide, Computerworld examines the issue of Green IT and how some organizations are making changes for the better. Read on to learn about data center sustainability and how it can be implemented at your organization. Learn More

Fidelity's top IT exec sees potential in A.I.

Since his January 2013 appointment as enterprise CTO at Fidelity Investments, Stephen Neff has made a significant impression in the financial services company's highest IT post. Earlier this year, he was named one of five finalists for the 2014 MIT Sloan CIO Leadership Award. Fidelity Investments He oversees an IT organization with an annual budget of $2.5 billion and 12,500 tech employees, associates and contractors around the globe. And he's tasked with running a distributed technology organization where a majority of workers operate within the various business lines reporting into business unit CIOs.To read this article in full or to leave a comment, please click here READ MORE

New IBM service shines a light on mobile device and app performance

With mobile devices rapidly becoming the tools of choice for enterprise work, IBM wants to help IT departments make sure they can serve all users.Developing and delivering software to laptops and desktops is only part of the battle these days. IBM has signaled that mobile is a big part of its enterprise future through the partnership it announced with Apple in July. No new products from that deal have surfaced yet, but on Tuesday, in a separate development, IBM added to its Mobility Services portfolio.One new service helps IT departments gauge how applications on mobile devices are working, while the other offers a way to deliver them virtually. Both are available now and work on any major mobile OS, said Linda Lyding, director of portfolio strategy and development.To read this article in full or to leave a comment, please click here READ MORE

Google's gigabit-Internet service in Austin priced at $70 per month

Google will offer a basic version of its broadband service for no monthly charge when it launches soon in Austin, Texas, with the 1Gbps service priced at $70 per month.The basic plan will provide download speeds of up to 5Mbps (megabits per second) and upload speeds of 1Mbps, according to Google, which announced its pricing plans Monday and said consumers in some neighborhoods will be able to sign up next month. Customers will pay a one-time "construction" fee of $300, but there will be no monthly charges after that.The middle-tier plan that provides Google Fiber's promised 1Gbps service will be priced at $70 per month, with the construction fee waived for a one-year commitment. That plan includes 1TB of cloud storage across Google Drive, Gmail and Google+ photos, the company said.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: CommVault

IDG MarketPulse: Lighting Up Dark Data CIO Research Paper

On average, just 28 percent of organizational data is stored because it has clear business value. Ominously referred to as dark data, those information assets grow and soak up resources without returning any business value. Learn More>>

Intel to tame passwords with biometric authentication

Forget typing in passwords, Intel wants you to use your body to log into email and online bank accounts.McAfee software that will use biometric technology to authenticate users will be available for download by the end of the year, said Kirk Skaugen, senior vice president and general manager of the PC Client Group at Intel, last week."Your biometrics basically eliminate the need for you to enter passwords for Windows log in and eventually all your websites ever again," Skaugen said.Further product details were not immediately available. But one of the major inconveniences in using PCs and tablets is remembering passwords, which biometrics can tame.To read this article in full or to leave a comment, please click here READ MORE

11 technologies Apple has killed

Out with the oldImage by Connie Ma via Flickr/Creative CommonsOne of the things that makes Apple so successful is that it's not afraid to abandon/kill popular technologies in the interest of something new. In doing so, the company often creates a bit of controversy, even if in the long run it seems to pan out well. At the same time, Apple's revolutionary products have helped bring down entire product categories. Here is a rundown of technologies and products that Apple has killed (or is in the process of killing) over the last 17 years.To read this article in full or to leave a comment, please click here READ MORE

Thwarting attackers with threat intelligence

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.News reports show cyber attacks continue to outpace IT's ability to protect critical data, but teams that have built systems to deliver accurate threat intelligence can often end an attack before damage is done. Threat intelligence comes from commercially available information, ongoing analysis of user behavior and native intelligence from within the organization.+ ALSO ON NETWORK WORLD 5 ways to escape password hell +To read this article in full or to leave a comment, please click here READ MORE

Google quadruples Nobel Prize in Computing to $1M

ACM The Association for Computing Machinery (ACM) has announced that its annual A.M. Turing Award, sometimes called the Nobel Prize in Computing, will now come with a $1M award courtesy of Google. Previously, the award came with a $250K prize funded by Google and Intel. The award, which goes to "an individual selected for contributions of a technical nature made to the computing community," is generally doled out in February or March. This past March, the winner was Microsoft Research principal Leslie Lambert, a distributed computing wrangler.To read this article in full or to leave a comment, please click here READ MORE

WEBCAST: Surfwatch Labs

How to Raise Cyber Risk Management to the C-Suite

In this webcast, CSO publisher Bob Bragdon leads a discussion with SurfWatch Labs Founder and Chief Architect, Jason Polancich and Terrago Technologies Chief Executive Officer Chris Broderick, around this shift of cybersecurity responsibility from the Server Room to the Board Room. Learn More

SLIDESHOWS

Top tech turkeys of 2014

This Thanksgiving, just be thankful you aren't associated with any of these people.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 14 go-to tools for Mac sysadmins

2. 11 technologies Apple has killed

3. No, Walmart, you can't walk away with my smartphone for price-matching purposes

4. Google launching 20 Internet balloons per day

5. 11 Black Friday deals for HP Pavilion All-in-One PCs with Windows 8.1

6. 20+ Jaw-Dropping Black Friday 2014 Tech Deals

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. Regin is groundbreaking malware on par with Stuxnet, Symantec says

9. SDN groups respond to Cisco's game over

10. Microsoft cold-shoulders Server 2003 and XP users hit with Microsoft Update error 0x80248015

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment