High-tech

High-tech
Light

Monday, December 15, 2014

Sony hackers release more data, promise ‘Christmas gift’

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 15, 2014 7:47 AM
Subject: Sony hackers release more data, promise 'Christmas gift'
To: <aquarianm@gmail.com>
Cc:

New products of the week 12.15.2014. View it in your browser

PixiePath to offer cloud platform for drone flight control. View it in your browser

NETWORKWORLD
Network World Daily News AM
December 15, 2014

Sony hackers release more data, promise 'Christmas gift'

A further dump of Sony Pictures corporate secrets appears to have been put on the Internet over the weekend, with hackers warning of more to come.A message pointing to 5 gigabytes of data was posted to the Pastebin website and signed by GOP. Thats presumably the same "Guardians of Peace" group or person that claimed responsibility for the Sony Pictures hack."We are preparing for you a Christmas gift," said the message. The gift will be larger quantities of data. And it will be more interesting. The gift will surely give you much more pleasure and put Sony Pictures into the worst state.The message asked Sony to send an email to one of five anonymous addresses "to tell us what you want in our Christmas gift."To read this article in full or to leave a comment, please click here READ MORE

 

Issue highlights

1. New products of the week 12.15.2014

2. PixiePath to offer cloud platform for drone flight control

3. Apple Watch yield issues reportedly solved; Mass production slated for January

4. Microsoft to open-source cloud framework behind Halo 4 services

5. Big new United Airlines carry-on item: iPhone 6 Plus phablets for 23,000 flight attendants

6. Death of antivirus software greatly exaggerated

7. INSIDER How to secure Apple, Android mobile devices using 802.1X

8. A brief history of Linux malware

9. When management meddles with passwords

10. Sony hacked in Feb, knew about huge security flaws before cybersecurity train wreck

White Paper: BMC Software

A New Opportunity for Capacity Planners

Mainframe software costs are the cost driver in many company's IT budgets and as such an increasing concern. We will describe the difficulty of managing an increasingly complex environment with limited data and small staffs and offer a methodology to safely and sanely identify achievable cost reductions. Learn More

New products of the week 12.15.2014

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.FileCloudKey feautres: Run your own, branded file sharing, sync and mobile access solution on top of AWS. Secure Endpoint Backup and Data Leak Prevention across all your users devices. More info.To read this article in full or... READ MORE

PixiePath to offer cloud platform for drone flight control

Drones are on the verge of becoming everyday service vehicles that will shuttle small items and eventually large ones between warehouses, retailers, and consumers as well as monitor traffic and agricultural operations, deliver pizza, survey building sites, execute search and rescue, …  the list of possible uses is huge.  PixiePath Delivery drone All of these operations will be done at... READ MORE

Apple Watch yield issues reportedly solved; Mass production slated for January

Make no mistake about it, what don't actually know much about the Apple Watch. Sure, we know what the different models will look like, not to mention a few interesting use-cases, but that's really about it. Meanwhile, important information such as pricing across all models and a release date remain unknown. The rumor mill has suggested that the Apple is... READ MORE

White Paper: Box

Cloud File Sharing Solutions: Box vs. Dropbox

This report is recommended for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet. Learn more

Microsoft to open-source cloud framework behind Halo 4 services

Microsoft plans to open-source the framework that helps developers of cloud services like those behind the popular Halo 4 game.Building cloud services for millions of users means connecting and coordinating thousands of servers, and handling tasks and information across all of them. Project Orleans is a framework built by the eXtreme Computing Group at Microsoft Research using .NET, designed so... READ MORE

Big new United Airlines carry-on item: iPhone 6 Plus phablets for 23,000 flight attendants

United Airlines this week announced that its flight attendants will soon be equipped with Apple's iPhone 6 Plus phablets to take care of your safety, food and entertainment needs. Yes, they'll now be wielding phones almost bigger than the maximum-size for carry-on items (I exaggerate). More than 23,000 mainline flight attendants will start getting the smartphone with the 5.5-inch screen... READ MORE

Death of antivirus software greatly exaggerated

An executive at a company whose name is synonymous with antivirus software raised eyebrows earlier this year when he pronounced the death of that form of system protection. Nevertheless, while the effectiveness of that software may have waned over the years, security experts say the pronouncement by Symantec's senior vice president for information security Brian Dye was premature. Certainly the... READ MORE

Resource compliments of: SolarWinds®

Security Management and Compliance Monitoring

SolarWinds® Log & Event Manager is a comprehensive SIEM for any security pro. Increase security visibility with 24x7 automated monitoring and real-time analysis. Tackle log management and compliance monitoring with expert developed, pre-packaged templates. Perform rapid root cause analysis with built-in intelligence and strong visualization. Gain the power of SIEM without spending a fortune or hiring an army. Download a free, fully-functional trial and start analyzing your log files within an hour.

INSIDER

How to secure Apple, Android mobile devices using 802.1X

When connecting to an enterprise-secured network with Android devices, users are prompted with many settings that could be confusing. When connecting with iOS devices—an iPad, iPhone, or iPod Touch—users are typically only prompted for their username and password. They can't edit the advanced 802.1X settings on the device, but there are ways to get around this.To read this article in... READ MORE

A brief history of Linux malware

A look at some of the worms and viruses and Trojans that have plagued Linux throughout the years. READ MORE

When management meddles with passwords

There's a password discussion ongoing today in the section of Reddit populated by system administrators and it was prompted by this lament: I work in sales now, and I was a former Network Administrator. Today I got an email from management that is asking everyone for their recently changed domain passwords (apparently this is a common practice for the company).This... READ MORE

Sony hacked in Feb, knew about huge security flaws before cybersecurity train wreck

The Sony hack is cross between a disastrous train wreck that you can't turn away from and tabloid magazines – you know the ones around check-out lanes that claim things like "aliens ate my baby." But in this case, the tabloid headlines in mainstream media are grabbed from real internal emails.It may be normal to be anxious about what you... READ MORE

White Paper: PC Connection | Acer

Acer Playbook: Proven Solutions for Professional Demands

Whether your workforce requires high-tech mobility, powerful desktops to streamline efficiency, reliable technology available 24 x 7, or competent tools for viewing and projecting, you'll find your solution in Acer notebooks, desktops, servers, monitors, and projectors. Learn More

SLIDESHOWS

Cisco's top 10 innovations over the years

A look back at Cisco's most innovative moves in its 30 years in the industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Sony may have used Amazon's cloud to launch a counter DoS attack

2. iPhone 6 Plus review: It's not big enough!

3. 11 technologies Apple has killed

4. A brief history of Linux malware

5. 30 years of Cisco: The networking giant's boldest predictions over the years

6. Peeping into 73,000 unsecured security cameras thanks to default passwords

7. The POODLE flaw returns, this time hitting TLS security protocol

8. Cisco Acquires Neohapsis: A Sign of the Times

9. Cisco was surprised by Arista statements: Chambers

10. Cisco sees a data analytics fortune at the edge of the network

Follow Networkworld

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright (C) 2014 Networkworld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment