Thursday, June 5, 2014

The Reg: NSA: Inside the FIVE-EYED VAMPIRE SQUID of the INTERNET [Fri Jun 6 2014]

The Register
Daily Headlines

6 June 2014

Hello, etechnews today.
Log in to alter your email preferences Login

Check out our other feeds and services

2013 Cyber Risk Report
A comprehensive dive into today's cyber vulnerability and threat landscape. Providing information to effectively plan your cyber security strategy and deploy your defenses.
Download here >

Business News

Channel News

Cisco COO: 'I actually thank God that we had a crisis'...

14k bods lost their Cisco jobs, but if hadn't happened 'we'd be screwed'

Data Centre News

Google reaches into own silicon brain to slash electricity bill

Skunkworks PEGASUS system tramples cloud's ugly power-sucking secret

Hardware News

Here come Samsung's, er, Barnes & Noble's new Galaxy Tab, er, Nook fondleslabs

Bookseller, Korean firm strike deal to deliver co-branded kit

Networks News

Verizon threatens Netflix in video lag blame game

Carrier threatens to release its (legal) hounds over flick-flinger's error messages

2013 Cyber Risk Report
A comprehensive dive into today's cyber vulnerability and threat landscape. Providing information to effectively plan your cyber security strategy and deploy your defenses.
Download here >

Policy News

Feds: Amazon cloud can be used for healthcare data

Insurers: Why did you make us buy all these on-premise servers, then?

Security News

Thanks for nothing OpenSSL, cries stonewalled De Raadt

BSD grumpy it isn't in the cool kids infosec club

Site News

Techies Ahoy! Amazon Web Services has a roadshow just for you

Promo Five city stops in UK and Ireland for free session

Software News

First iOS, now Android to get fondleslab Office ahead of Windows

Move would make Windows DEAD LAST in release cycle

Science News

Plastic is the new rock, say Geologists

'Plastiglomerate' layer entering the geological record

2013 Cyber Risk Report
A comprehensive dive into today's cyber vulnerability and threat landscape. Providing information to effectively plan your cyber security strategy and deploy your defenses.
Download here >

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.