Tuesday, December 23, 2014

How much of 2014 in tech do you remember? Take our slightly silly quiz!

Two-factor authentication oversight led to JPMorgan breach, investigators reportedly found. View it in your browser

BOOK GIVEAWAY: Advanced Android Application Development, 4th Edition. View it in your browser

ITworld Today
December 23, 2014

How much of 2014 in tech do you remember? Take our slightly silly quiz!

Mt. Gox? HP's split? WhatsApp? That was all this year, folks! See which stories you can still remember this late in the game. READ MORE

 

Issue highlights

1. Two-factor authentication oversight led to JPMorgan breach, investigators reportedly found

2. BOOK GIVEAWAY: Advanced Android Application Development, 4th Edition

3. Misfortune Cookie vulnerability affects 12 million routers (CSOonline.com)

4. North Korea's Internet restored after over 9-hour outage

5. I'm done agreeing to NDA's before hearing ideas

6. How to deal with uncertainties in software development

7. Are personality assessments effective hiring tools? (CIO.com)

8. Google hitches cloud data analysis to Java SDK

9. Leak indicates that Samsung's first Tizen smartphone will debut in January 2015

10. Apple issues NTP security update for OS X

11. Google looks for partners as it unveils autonomous car prototype

WHITE PAPER: Polycom

The Impact of Polycom Voice Solutions for Microsoft Lync

Download this study to learn how one organization with 24,000 Polycom voice devices and Lync Enterprise Voice achieved a 98% risk-adjusted ROI and a payback period of 21 months. Learn more >>

Two-factor authentication oversight led to JPMorgan breach, investigators reportedly found

The attackers stole an employee's access credentials and used them to access a server that lacked a stronger authentication mechanism. READ MORE

BOOK GIVEAWAY: Advanced Android Application Development, 4th Edition

We've got 5 copies to give to some lucky ITworld readers. Enter now for your chance to win! READ MORE

Misfortune Cookie vulnerability affects 12 million routers (CSOonline.com)

Newly-discovered vulnerability puts 12 million routers at risk. READ MORE

North Korea's Internet restored after over 9-hour outage

The outage had led to speculation that the US had retaliated in the wake of the hack of Sony Pictures. READ MORE

I'm done agreeing to NDA's before hearing ideas

Here's how I can tell you don't know what you're doing before I hear your idea, ask me to sign an NDA. READ MORE

: Ixia

5 Insider Tips to Implementing A Visibility Architecture

The network is a battlefield of attacks on your critical data—and blind spots prevent your security tools from seeing those threats. Only visibility into what is happening on your network will protect you. View more

How to deal with uncertainties in software development

Software project managers can't ever hope to eliminate uncertainty, but they can reduce it and be prepared to deal with unexpected events. READ MORE

Are personality assessments effective hiring tools? (CIO.com)

Businesses often use personality assessments to gauge a candidate's degree of cultural fit, but what do these tests really tell employers? READ MORE

Google hitches cloud data analysis to Java SDK

The company is looking to extend its Google Cloud Dataflow platform to other languages and environments. READ MORE

Leak indicates that Samsung's first Tizen smartphone will debut in January 2015

The Samsung Z1 is a low-end phone that the company likely hopes will make an impact in emerging markets. READ MORE

Apple issues NTP security update for OS X

Apple releases a critical security update that affects OS X Mountain Lion, Mavericks, and Yosemite users. READ MORE

Google looks for partners as it unveils autonomous car prototype

Google says it doesn't want to become a car manufacturer as self-driving prototypes hit the road. READ MORE

WHITE PAPER: Dell Software

Anti-Evasion: Why It's a Critical Component

Learn why anti-evasion is a critical component for your intrusion prevention system. Sophisticated exploits that utilize advanced evasion techniques are all too common. Decoding and normalizing traffic across the network to detect and combat these attacks is critical for your network security plan. Learn more!

BECOME AN ITWORLD INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 7 tips for landing a job at a coding competition

- Data analytics scores marketing wins for the Texas Rangers

- Getting started with power-line networking

DECEMBER GIVEAWAYS

We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Advanced Android Application Development, 4th Edition
This guide provides in-depth explanations of code using key API features and includes downloadable sample apps for nearly every chapter. Together, they provide a solid foundation for any modern app project. Enter now!

Ubuntu Unleashed 2015 Edition: Covering 14.10 and 15.04, 10th Edition
Learn all you need to know about installation, configuration, productivity, multimedia, development, system administration, server operations, networking, virtualization, security, DevOps, and more — including intermediate-to-advanced techniques you won't find in any other book. Enter now!

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.