Wednesday, October 15, 2014

Dropbox dismisses claims of hack affecting 7 million accounts

  Dropbox dismisses claims of hack affecting 7 million accounts | Symantec reportedly in talks to split into storage and security units

 
  ITworld Storage Strategies

Google Plus LinkedIn Facebook Twitter


TDK shows its first MRAM prototype, a competitor for flash memory
Japan's TDK is showing for the first time its prototype of a new memory chip technology that is seen as a promising replacement for today's ubiquitous flash memory. Read More
 


WEBCAST: Kaminario

Introducing K2's 5th Generation
The Kaminario K2 is an enterprise-grade, general-purpose, all-Flash storage array designed to work with the mixed workloads of OLTP, analytic and virtualized applications. Watch this 2 minute video to get a quick overview of this high-performance, cost-efficient storage platform, its architecture and enterprise-class features. Learn More>>

WHITE PAPER: Code 42

Leveraging Endpoint Backup for Legal Holds & E-Discovery
As the volume, mobility and compliance requirements of enterprise data explodes, so has the need to collect and preserve data for the purpose of e-discovery. Learn how enterprise endpoint backup can satisfy data collection and preservation requirements in a more streamlined and cost-effective manner than traditional e-discovery methods. Learn More

Dropbox dismisses claims of hack affecting 7 million accounts
Hackers claim to have stolen a database of almost 7 million Dropbox log-in credentials, but the company says its service was not hacked and that unrelated websites are the data source. The first data dump appeared Monday in an anonymous post on Pastebin.com and contained 400 username and password pairs. The author said that it's only the "first teaser" of 6,937,081 hacked Dropbox accounts and asked for community support in the form of Bitcoin donations. The user also claimed to have access to photos, videos and other files from the compromised accounts. "As more BTC [Bitcoin currency] is donated, more pastebin pastes will appear," the post says.To read this article in full or to leave a comment, please click here Read More
 

Symantec reportedly in talks to split into storage and security units
Taking a cue from Hewlett-Packard and eBay, Symantec is said to be in talks to carve out the company into two entities. Read More
 

How to deploy Synology NAS for your small business
The Synology RS3614RPxs is a new 2U storage appliance with 12 drive bays that supports both 3.5-inch and 2.5-inch SATA hard disk drives (HDDs). Here's how this modern NAS can be set up to offer core storage and private cloud capabilities for your small business. Read More
 

Samsung begins mass production of 3-bit 3D NAND chips
The chips will be used in next-generation SSDs. Read More
 


WHITE PAPER: F5 Networks
 
Fight Malware, Malfeasance and Malingering
Every year brings an even more extreme set of threats to the enterprise than the last. The good news is that enterprises have a range of mitigation options. The question is which solution offers the organization the greatest protection and control without adding complexity or unnecessary costs. Learn more >>

 

Seagate 4-bay NAS review: Competent workgroup storage inside a classy chassis
The NAS Pro hits the mark for workgroups with a good feature set, design and performance - but a sparse app store limits its usefulness. Read More
 

 

DON'T MISS...

Head-scratchers: 10 confounding programming language features

Top 25 free tools for every Windows desktop

15 simple, secret Windows tips and tricks to save you time

Superclass: 14 of the world's best living programmers
 

The 10 best laptops of 2014 (so far)

ITWORLD GIVEAWAYS:

We've got 5 copies of each of this books to give to some lucky ITworld readers. Enter now for your chance to win!

Help Your Kids with Computer Coding
Take your kids from browsing to building the web. Fun projects throughout let kids start putting their computer skills into practice and build their own code using Scratch programming and Python. Enter now!
 
Introduction to Agile Methods
If you want to understand Agile and become conversant with Agile values, principles, framework, and processes, this book is the place to start. Enter now!

Programming in C, 4th Edition
Learn C by example, with complete C programs used to illustrate each new concept along the way. Enter now!


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_storage_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.