Friday, February 28, 2014

Bitcoin malware count soars as cryptocurrency value climbs

The next wave of cars may use Ethernet tech | Intel expects Bay Trail successor in tablets by year end

Computerworld Wrap-Up

Forward this to a Friend >>>


Bitcoin malware count soars as cryptocurrency value climbs
As bitcoin values jumped in the last months of 2013, malware designed to steal the virtual currency exploded, security researchers from Dell SecureWorks said this week. Read More


WEBCAST: IBM

Identify and Minimize Fraud Risks
View this IBM webinar to learn about the challenges and opportunities in fraud reduction, waste, and abuse in government programs and agencies. You will learn how IBM Intelligent Investigation Manager (IIM) can help your organization. Learn More.

WHITE PAPER: Oracle

The Effect of Project Management on Share Price
In this independent report, you'll see the intrinsic connection between long-term capital investment and short term market performance -– and how this can impact the profit outlook. It examines existing research, industry examples, and explores practical approaches to maintaining effective visibility and control over key operational metrics. Learn More

The next wave of cars may use Ethernet tech
The most ubiquitous local area networking technology used by big business may be packing its bags for a road trip. Read More

Intel expects Bay Trail successor in tablets by year end
Intel is expecting its next Atom tablet chip, code-named Cherry Trail, to be in devices by the end of this year, the company said this week. Read More

Shrinking microcontrollers, means smaller wearable computers
If you want a wearable Internet of Things, the electronics have to be as small and as energy efficient as possible. That's why a new microcontroller by Freescale Semiconductor is notable. Read More

Tip of the Hat: Unanswered questions in Boeing Black specs
This week's posting of specifications for the secure Boeing Black smartphone brought out references to the old Mission Impossible television show and other fictional spy heroes. Read More

Mobile app for RSA Conference exposes personal data
A mobile application designed to make it easier for RSA Conference 2014 attendees to navigate the event and interact with their peers exposes personal information, according to researchers from security firm IOActive. Read More


WHITE PAPER: IntraLinks

Data Privacy: Where Should I House My Data?
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. View Now

Class-action suit charges Mt. Gox with fraud, seeks return of users' bitcoins
A class-action lawsuit has been filed against the Mt. Gox Bitcoin exchange and its owner Mark Karpeles, seeking damages in the hundreds of millions of dollars and the return of bitcoins to users whose accounts were frozen on the site. Read More

Gameover malware is tougher to kill with new rootkit component
A new variant of the Gameover malware that steals online banking credentials comes with a kernel-level rootkit that makes it significantly harder to remove, according to security researchers from Sophos. Read More

Microsoft mapping patent ruled invalid in Germany
The German Federal Patent Court invalidated a Microsoft mapping patent because it lacked an inventive step, a court spokeswoman said Friday. The company had alleged that Motorola Mobility and Google infringed the patent in the Google Maps app. Read More

Jaikumar Vijayan: Booze, bots and other RSA ruminations
SAN FRANCISO -- Dan Kaminsky looks like he could really use some rest. "Long day?" I ask him. He shrugs. It's been a long several days, weeks, and months, he says as we trudge our way to a table in the south foyer of San Francisco's Moscone Center to talk about White Ops, a company he helped found. Read More

Preston Gralla: Smile, Kinect users. The Brits may spy on you with your camera.
A report that Britain's spy agency GCHQ has snooped on and stored webcam images from millions of Yahoo users has potential dangers for Kinect owners. The surveillance agency has been evaulating using Kinect's camera to spy on its owners as well. Read More

Jonny Evans: More than shiny: Apple is an enterprise firm
They say: "Apple is not an enterprise company", but things have changed -- Tim Cook's Apple is an enterprise company, here's some proof. Read More


FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise, document how mobile device management is morphing to meet new demands, reflect on the ways Google has developed into a surprisingly powerful ecosystem for end users, and share observations on BYOD's role in spawning a new army of empowered workers.

This free, 28-page magazine-style report is available now. [Registration required]

To read the report, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
A recent survey found that 40% of tech support workers had to remove malware from devices after employees visited adult content sites. Is this a problem at your company?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 1:26 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive