Issue highlights 1. DEFCON's Latest challenge: Hacking altruism 2. JavaScript is the top programming language for startups 3. BOOK GIVEAWAY: The Official Ubuntu Book, 8th Ed. 4. Amazon introduces mobile card reader to compete with Square, PayPal 5. Malware is less concerned about virtual machines 6. Microsoft Patch Tuesday focuses on Internet Explorer 7. Former exec says HP 'bungled' the Autonomy acquisition, alleges cover-up 8. New security tools from Tenable, HP, Co3 attempt the impossible 9. AppliedMicro's 64-core chip could spark off ARM core war |
| White Paper: CloudBees Download this whitepaper to learn more about the business value of Continuous Delivery and see why it could be a game changer for your organization. Learn More |
| The world's biggest hacker conference is bigger and more irreverent than ever. But this year's show puts life and limb alongside lulz, with a focus on public safety and altruism. READ MORE |
| New data from AngelList shows the top technology choices that startups are making. READ MORE |
| Whether you're new to Ubuntu on on your way to power user status, "The Official Ubuntu Book" is your ideal one-stop knowledge source. Five will win. Enter the drawing today! READ MORE |
| Amazon.com has introduced a card reader coupled with smartphone and tablet apps that aim to provide small businesses with a way to accept payments on these devices. READ MORE |
| White Paper: HP This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight -- a Security Information and Event Management (SIEM) solution from HP -- applies these techniques to spot and stop attacks. Learn More |
| Many malicious software programs used to make a quick exit on virtual machines, a tactic designed to avoid a security check. But that isn't the case anymore, according Symantec research. READ MORE |
| Microsoft has issued 29 patches for its Internet Explorer browser, including one fixing a critical vulnerability that would allow a remote attacker to gain access to a computer from over the Internet. READ MORE |
| Autonomy's former chief financial officer has claimed that Hewlett-Packard is accusing him and other ex-employees of fraud in order to cover up its own failings in the disastrous 2011 acquisition. READ MORE |
| Automated incident response promises total network security by combining threat detection, prevention and response. READ MORE |
| A decade-old race to crank up core counts in x86 chips may have lulled, but the competition has just started picking up in ARM processors. READ MORE |
| White Paper: Netscout Systems Inc. In this report, EMA examines the value of a network-based application-aware performance management strategy that provides depth and top-down troubleshooting, as well as business-relevant, real-time insights for converged operations monitoring and support. Learn More |
| |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.