Friday, June 13, 2014

Biggest, baddest, boldest software backdoors of all time

Starbucks' new wireless charging won't work for most devices

Why open source software isn't as secure as you think

ITworld Today
June 13, 2014
Share this email

Biggest, baddest, boldest software backdoors of all time

These 12 historically insidious backdoors will have you wondering what's in your software -- and who can control it.

READ MORE
 

Issue highlights

1. Starbucks' new wireless charging won't work for most devices

2. Why open source software isn't as secure as you think

3. Spec standoff: Samsung Tab S 10.5 vs. Sony Xperia Z2 Tablet

4. US Marshals will auction rather than destroy seized Silk Road bitcoins

5. Apple starts exchange program for iPhone adapters that could overheat

6. Amazon launches Prime Music and it's sort of OK

7. P.F. Chang's turns to manual card processing after confirming breach

8. US indicts Romanian man alleged to be celebrity hacker 'Guccifer'

9. CARTOON: Netflix v. Verizon is getting good

White Paper: Imperva

IPS and NGFWs Leave Dangerous Gaps in Enterprise Security

Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders better protect Web applications in their organizations. Learn more!

Starbucks' new wireless charging won't work for most devices

Wireless charging wars are likely to limit the technology adoption for the time being. READ MORE

Why open source software isn't as secure as you think

The security of open source software relies on the community spotting errors -- but Heartbleed and other recent events suggest that that's not happening. READ MORE

Spec standoff: Samsung Tab S 10.5 vs. Sony Xperia Z2 Tablet

The Sony tablet is thinner and lighter, but Samsung isn't far behind and offers a higher screen resolution. READ MORE

US Marshals will auction rather than destroy seized Silk Road bitcoins

The law enforcement agency could have simply deleted the virtual currency. READ MORE

White Paper: Ericom Software

BYOD is Here to Stay, But Organizations Must Adapt

As more and more employees bring their personal laptops and mobile devices to the workplace, IT teams are dealing with new security, compliance, support, management and cost challenges associated with BYOD. Learn More

Apple starts exchange program for iPhone adapters that could overheat

The affected adapter can be exchanged in 37 countries. READ MORE

Amazon launches Prime Music and it's sort of OK

This isn't a service ready to be sold as a stand-alone, it's just a sweetener for Amazon Prime. READ MORE

P.F. Chang's turns to manual card processing after confirming breach

The restaurant chain is the latest victim of a breach. READ MORE

US indicts Romanian man alleged to be celebrity hacker 'Guccifer'

A Romanian man sentenced just last week in his own country for raiding online accounts linked to prominent politicians and celebrities was indicted Thursday in a U.S. federal court. READ MORE

CARTOON: Netflix v. Verizon is getting good

Who says there's nothing to watch? When two big companies go at it publicly, we all win. READ MORE

Webcast: CA Technologies

The End of Data Protection As We Know It.

A fundamental change is necessary to fix data protection. It requires the adoption of a modern architecture that has been designed to solve today's complex problems, as well as provide a highly scalable platform for the future. Learn more!

SURVEY

Take ITworld's cloud survey and you could win $500
ITworld is conducting a brief survey regarding cloud computing initiatives, and we value your input. The survey will take you about 10 minutes to complete. And there's a reward! Respondents who complete the survey will be entered in a sweepstakes to win a $500 cash prize. Take the survey now!

GIVEAWAYS:

Enter today for your chance to win!

The Rails 4 Way
Through detailed code examples, you'll dive deep into the Rails 4 code base, discover why Rails is designed as it is, and learn how to make it do exactly what you want. Enter now!

JavaScript Essentials LiveLessons (Video Training)
In 4 hours of video instruction, JavaScript Essentials LiveLessons provides a solid foundation on which to build skills, from the perspective of a web developer. Enter now!

DON'T MISS...

10 tech products that are built to last

16 terrible computer pranks that could get you fired

Your new PC needs these 22 free programs

Pants on fire: 9 lies that programmers tell themselves

History's 15 most popular computer scientists

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.