| IT News Daily | | | Hackers recently broke into payment systems at several northwestern U.S. restaurants and food service firms via a remote access account belonging to one of their vendors, another example of the need for companies to monitor third-party access to their networks. | | | Issue highlights 1. VMware opens up testing of next-gen vSphere to anyone 2. Critics blast Microsoft's takedown of No-IP domains 3. Windows 8 uptake sags, flirts with flop 4. Brain-decoding chip, algorithms give quadriplegic movement again 5. US privacy board finds no illegitimate activity in overseas surveillance program 6. Ideas for defending against cyberespionage | | | VMware is for the first time inviting anyone to beta test the next version of vSphere, the company's virtualization platform. READ MORE | | Microsoft's tactics in using a court order to seize nearly two-dozen No-IP.com domains it said were used to distribute Windows malware tools were called ham-handed by several critics. READ MORE | | WEBCAST: Dell Software LIVE WEBCAST: Thursday, July 10, 2014, 2:00 PM EDT Join Dell to understand the risks introduced when personal devices are used for business purposes and learn about technologies to help enable mobile worker productivity while minimizing business risk. Learn more! | | Windows 8's uptake stumbled last month, and the perception-plagued operating system flirted with falling behind the tempo of the Windows Vista flop of seven years ago. READ MORE | | Thanks to a computer chip, algorithms and nearly 10 years of research, a 23-year-old quadriplegic moved his fingers and hand with the power of his own thoughts. READ MORE | | RESOURCE COMPLIMENTS OF: IDG TV Watch all the latest videos from IDG's global network of technology experts, all teed up in searchable channels with a fun, fresh look. Click to continue | | A U.S. government privacy oversight board has found that the National Security Agency and other agencies have not misused the provisions of the country's overseas surveillance program, but cautioned that certain aspects of the program, such as the incidental collection of communications of U.S. persons, raises privacy concerns. READ MORE | | Russian hackers who broke into the networks of Western oil and gas companies used techniques that companies can detect and oftentimes defend against, experts say. READ MORE | | | | |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.