Tuesday, November 19, 2013

Cryptolocker: The evolution of extortion

  Perspective: Curbing data use is key to reining in NSA | Firefox Nightly: A visual tour of the new Australis UI

 
  Computerworld Wrap-Up

Forward this to a Friend >>>


Cryptolocker: The evolution of extortion
The Cryptolocker Trojan is an evolution of "ransomware," not a revolutionary change from past criminal attempts to extort money from PC owners, a security expert said today. Read More
 


In this Issue


WHITE PAPER: SAP

Innovation in Enterprise Cloud Management
Managing the enterprise cloud using SAP HANA allows you to reinvent your business, do more with less, and support business with technology. This KnowledgeVault explains how to roll out new business processes with Two-Tier Innovation, harness the power of Big Data, expand mobile solutions and innovate with public cloud solutions. Learn more

Perspective: Curbing data use is key to reining in NSA
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected. Read More
 

Firefox Nightly: A visual tour of the new Australis UI
  Firefox rolled out the new 'Australis' UI to its Nightly browser channel on Monday. Here is what the update looks like. Read More
 

Retina iPad Mini's 'secretive' launch continues, shortages persist
The Retina iPad Mini's "secretive" launch was driven by severe shortages, which have not improved since Apple started selling the smaller tablet a week ago, a financial analyst said today. Read More
 

Google wants you walkin' in its Winter Wonderlabs
Google opened gadget showrooms in six U.S. cities as the holiday shopping season quickly approaches. Read More
 

Snap! 'Selfie' becomes International Word of the Year
If you posted selfies on Facebook, Instagram or Twitter this past year, you helped make "selfie" the Oxford Dictionaries' international Word of the Year for 2013 Read More
 

Warning! Targeted Internet misdirection on the rise
Unknown attackers have successfully hijacked and redirected Internet traffic belonging to financial services companies, VoIP providers and governments many times over the past year. Read More
 

Supreme Court refusal to block NSA data collection not surprising
Privacy rights advocates and legal experts this week said they were disappointed but not surprised with the U.S. Supreme Court's denial of a petition challenging the legality of the National Security Agency's phone metadata collection program. Read More
 

In role reversal, Ballmer stays composed, Gates chokes up, in shareholder meeting
In his last appearance at a Microsoft shareholder meeting as CEO, Steve Ballmer said he's completely certain the company is in very good shape to succeed in the next decade under someone else's captainship. Read More
 


WHITE PAPER: Kaspersky

Security Technologies for Mobile and BYOD
With so many security technologies available, how do you sort through the options and pick the solutions that will really work for your business? Learn More.

Nokia shareholders approve sale of smartphones to Microsoft
More than 99 percent of Nokia's shareholders have voted to approve Microsoft's acquisition of the Finnish company's Devices & Services business. Read More
 

As sale to Microsoft closes, here's a salute to Nokia's most iconic phones
Today Nokia's shareholders voted to approve Microsoft's acquisition of the company's Nokia's Devices & Services business. The deal marks the end of an era that has produced many iconic phones. Read More
 

Apple's $380M case against Samsung goes to jury
A jury in California will begin deliberating over how much money Samsung should pay to Apple for the infringement of several patents in multiple models of Samsung smartphones. Apple wants just under $380 million, but Samsung argues it shouldn't pay more than $52 million. Read More
 

Google strengthens its SSL configuration against possible attacks
Google replaced the SSL certificates for its online services with new ones that use stronger, 2048-bit RSA keys, making encrypted connections to its sites safer against so-called brute-force attacks. Read More
 

Ubuntu Linux server with ARM processor rolled out by Boston Limited
Boston Limited has announced a new server based on ARM processors and certified to run Ubuntu Linux 13.10, a move that could further stir up growing interest in ARM servers. Read More
 

Intel rushes to exascale with redesigned Knights Landing chip
In the rush to exascale computing, Intel is making a small change that could have a big impact on system design with its upcoming Xeon Phi chip. Read More
 

Jonny Evans: iOS 7 tips: taking better iPhone photos
iPhones are the most popular cameras in the Flickr community, so here's some tips iPhonographers can use to take better pictures. Read More
 

Preston Gralla: Steve Balmer's farewell message to Microsoft shareholders: Save Bing and Xbox
Stock analysts and even a potential CEO candidate are calling for Microsoft to sell off Bing and its XBox division, but Steve Ballmer, in his final speech to company shareholders, makes it plain: He believes both are core to Microsoft's success. Is he clinging to yesterday's vision, or is he on target? Read More
 

 

FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt.

COMPUTERWORLD'S 2014 SALARY SURVEY
 

How will your salary compare with your IT peers? Computerworld's 28th Annual Salary Survey will feature the latest IT salary trends and advice on where to find the best-paying jobs. This year's survey participants can enter a drawing to win 1 of 3 American Express gift cards for $500 each! The drawing is open to legal U.S. residents, age 18 or older.

Take our annual Salary Surveytoday!

DIGITAL SPOTLIGHT: SECURITY
 

In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up.

This free, 28-page magazine-style report is available now [Registration required]

To read the report, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we run the numbers on BYOD, document cool new technologies making their way into the enterprise, and share tips from top companies on how to cope with exploding demand. This free, 12-page magazine-style report is available now [Registration required]

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
A recent survey shows that 90% of drivers would consider using an autonomous car if it would cut their insurance rates. Are you one of them?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 
 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 1:34 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive