Wednesday, March 27, 2013

15 worst data breaches

Splashdown!! SpaceX Dragon returns to Earth

Yahoo buys teenager's mobile app company

ITworld Today
March 27, 2013
Share this email

15 worst data breaches

Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory.

READ MORE
 

Issue highlights

1. Splashdown!! SpaceX Dragon returns to Earth

2. Yahoo buys teenager's mobile app company

3. Victim of $440K wire fraud can't blame bank for loss, judge rules

4. Microsoft confirms it's shut off Windows 8-Google Apps calendar sync

5. VIDEO: How to back up, wipe and restore your iPad

6. Most Java-enabled browsers vulnerable to widespread Java exploits, Websense says

7. Microsoft to host BUILD dev conference on Apple's home ground

8. Facebook starts testing targeted ads in News Feed

9. Watch this cool homemade Jurassic Park shot-by-shot clip

10. LAST CHANCE: Win a copy of 'jQuery, jQuery UI, and jQuery Mobile: Recipes and Examples'

Resource compliments of: NetApp

Got a virtual machine?

Try the industry-leading virtualization platform and #1 storage OS. Download the VMware® and NetApp® trial. Learn more www.netapp.com/dataontap Learn more www.netapp.com/dataontap

Splashdown!! SpaceX Dragon returns to Earth

The SpaceX Dragon spacecraft safely splashed down in the Pacific Ocean, winding up a three-week mission to resupply the International Space Station. READ MORE

Yahoo buys teenager's mobile app company

Yahoo announced that it is buying Summly, a company that developed an app that condenses information and makes it easily and quickly readable on mobile devices. READ MORE

Victim of $440K wire fraud can't blame bank for loss, judge rules

A federal court in Missouri has rejected an escrow firm's attempt to blame its bank for a $440,000 cyberheist in March 2010. READ MORE

Microsoft confirms it's shut off Windows 8-Google Apps calendar sync

Microsoft confirmed Monday that Windows 8 users who upgrade the Calendar app will no longer be able to synchronize that schedule with the calendar included with Google Apps for Business, Academic or Government. READ MORE

VIDEO: How to back up, wipe and restore your iPad

If you're planning to sell or give away your iPad, then it is essential that your personal information and data be erased from it. If it's running sluggish after a few years, sometimes backing up your data, erasing it from the tablet and restoring it might improve performance. READ MORE

White Paper: F5 Networks

Solving Substantiation with SAML

Read this paper to learn how F5 uses SAML to effectively enable secure web domains to exchange user authentication and authorization data, providing users of web browsers with single sign-on (SSO) convenience they need. Learn More!

Most Java-enabled browsers vulnerable to widespread Java exploits, Websense says

Most browser installations use outdated versions of the Java plug-in that are vulnerable to at least one of several exploits currently used in popular Web attack toolkits, according to statistics published Monday by security vendor Websense. READ MORE

Microsoft to host BUILD dev conference on Apple's home ground

Microsoft on Tuesday announced that its BUILD 2013 developers conference will be held June 26-28 on Apple's home turf, San Francisco's Moscone Center. READ MORE

Facebook starts testing targeted ads in News Feed

Facebook has started displaying targeted ads in some users' desktop News Feeds in a test of Facebook Exchange ad delivery system. READ MORE

Watch this cool homemade Jurassic Park shot-by-shot clip

While mash-ups remain popular, videos that "Swede" original films are gaining traction and viewers. READ MORE

LAST CHANCE: Win a copy of 'jQuery, jQuery UI, and jQuery Mobile: Recipes and Examples'

Enter today for your chance to win. The drawing ends March 31. READ MORE

White Paper: Sophos, Inc.

Endpoint Buyers Guide

This buyers guide provides independent research and test results to help you determine your endpoint protection requirements and identify the security vendor that best meets your needs. Learn more.

BOOK GIVEAWAY

Our March contests are coming to an end. Enter before March 31 for your chance to win!

jQuery, jQuery UI, and jQuery Mobile: Recipes and Examples
This guide brings together more than one hundred self-contained, downloadable examples, each with an in-depth explanation of how the code works and how to adapt it for your own needs.

The Book of GIMP: A Complete Guide to Nearly Everything
Whether you're just getting started with this free Photoshop alternative or working to master GIMP's more complex features, you'll find the answers you're looking for in The Book of GIMP.

DON'T MISS...

Killer open source admin tools

20 historic tech sounds you may have forgotten

Smartphone comparison: Samsung Galaxy S4 vs. Sony Xperia Z vs. HTC Ones

The best office apps for your iPad, round 4

25 crazy and scary things the TSA has found on travelers

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.