Issue highlights 1. Two-factor authentication oversight led to JPMorgan breach, investigators reportedly found 2. BOOK GIVEAWAY: Advanced Android Application Development, 4th Edition 3. Misfortune Cookie vulnerability affects 12 million routers (CSOonline.com) 4. North Korea's Internet restored after over 9-hour outage 5. I'm done agreeing to NDA's before hearing ideas 6. How to deal with uncertainties in software development 7. Are personality assessments effective hiring tools? (CIO.com) 8. Google hitches cloud data analysis to Java SDK 9. Leak indicates that Samsung's first Tizen smartphone will debut in January 2015 10. Apple issues NTP security update for OS X 11. Google looks for partners as it unveils autonomous car prototype |
| WHITE PAPER: Polycom Download this study to learn how one organization with 24,000 Polycom voice devices and Lync Enterprise Voice achieved a 98% risk-adjusted ROI and a payback period of 21 months. Learn more >> |
| The attackers stole an employee's access credentials and used them to access a server that lacked a stronger authentication mechanism. READ MORE |
| We've got 5 copies to give to some lucky ITworld readers. Enter now for your chance to win! READ MORE |
| Newly-discovered vulnerability puts 12 million routers at risk. READ MORE |
| The outage had led to speculation that the US had retaliated in the wake of the hack of Sony Pictures. READ MORE |
| Here's how I can tell you don't know what you're doing before I hear your idea, ask me to sign an NDA. READ MORE |
| : Ixia The network is a battlefield of attacks on your critical dataand blind spots prevent your security tools from seeing those threats. Only visibility into what is happening on your network will protect you. View more |
| Software project managers can't ever hope to eliminate uncertainty, but they can reduce it and be prepared to deal with unexpected events. READ MORE |
| Businesses often use personality assessments to gauge a candidate's degree of cultural fit, but what do these tests really tell employers? READ MORE |
| The company is looking to extend its Google Cloud Dataflow platform to other languages and environments. READ MORE |
| The Samsung Z1 is a low-end phone that the company likely hopes will make an impact in emerging markets. READ MORE |
| Apple releases a critical security update that affects OS X Mountain Lion, Mavericks, and Yosemite users. READ MORE |
| Google says it doesn't want to become a car manufacturer as self-driving prototypes hit the road. READ MORE |
| WHITE PAPER: Dell Software Learn why anti-evasion is a critical component for your intrusion prevention system. Sophisticated exploits that utilize advanced evasion techniques are all too common. Decoding and normalizing traffic across the network to detect and combat these attacks is critical for your network security plan. Learn more! |
| BECOME AN ITWORLD INSIDER Get exclusive access to premium articles, product guides, reviews and more.
- 7 tips for landing a job at a coding competition - Data analytics scores marketing wins for the Texas Rangers - Getting started with power-line networking DECEMBER GIVEAWAYS We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!
Advanced Android Application Development, 4th Edition This guide provides in-depth explanations of code using key API features and includes downloadable sample apps for nearly every chapter. Together, they provide a solid foundation for any modern app project. Enter now!
Ubuntu Unleashed 2015 Edition: Covering 14.10 and 15.04, 10th Edition Learn all you need to know about installation, configuration, productivity, multimedia, development, system administration, server operations, networking, virtualization, security, DevOps, and more including intermediate-to-advanced techniques you won't find in any other book. Enter now! | |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.