Friday, December 19, 2014

The 'grinch' isn't a Linux vulnerability, Red Hat says

Critical vulnerability in Git clients puts developers at risk. View it in your browser

Think North Korea hacked Sony? Think about this. View it in your browser

ITworld Today
December 19, 2014

The 'grinch' isn't a Linux vulnerability, Red Hat says

The way Linux handles user permissions could still lead to potential misuse, security researchers say. READ MORE

 

Issue highlights

1. Critical vulnerability in Git clients puts developers at risk

2. Think North Korea hacked Sony? Think about this

3. 9 data breaches that cost someone their job (CSOonline.com)

4. Blackberry reports falling revenue, but loss shrinks

5. Vulnerability in embedded Web server exposes millions of routers to hacking

6. Buy an Office 365 subscription, get a free Windows 8.1 tablet

7. Cyberattack on German steel factory causes 'massive damage'

8. 10 cool marketing automation startups to watch (CIO.com)

9. Microsoft helps boost Android, iOS app performance with offline access

10. Hey Microsoft, the Xbox One needs a 'collapse snap' option

11. CARTOON: The Xbox One can't do everything

WEBCAST: Brocade Communications Systems, Inc

Flash and Fibre: Fulfilling the Promise of VDI

VDI deployment is on the rise and expected to deliver significant operational advantages—but will it? Some VDI projects don't make it past the proof-of-concept stage due to poor performance. Many more fail to deliver tangible benefits because they can't scale to support a wide user base. View Now>>

Critical vulnerability in Git clients puts developers at risk

Malicious Git code repositories can execute rogue commands on client machines interacting with them. READ MORE

Think North Korea hacked Sony? Think about this

There's a lot of circumstantial evidence, but very little actual information on the hack against Sony. READ MORE

9 data breaches that cost someone their job (CSOonline.com)

Notable breach-related job losses in 2014. READ MORE

Blackberry reports falling revenue, but loss shrinks

The company is increasing its distribution capability, pinning hopes on sales of its new Passport and Classic smartphones. READ MORE

Vulnerability in embedded Web server exposes millions of routers to hacking

Attackers can take control of millions of routers by sending a specially crafted request to RomPager, an embedded Web server running on them. READ MORE

: WhiteHat Security, Inc.

Application Security eGuide

In this eGuide, CSO along with sister publications Computerworld, CIO, and Networkworld examine the latest trends and thinking in application security. Read on to learn how to better protect the applications your organization develops and uses. Learn more >>

Buy an Office 365 subscription, get a free Windows 8.1 tablet

This super cheap tablet comes with a year of Office 365--for less than the price you'd pay for Office 365. READ MORE

Cyberattack on German steel factory causes 'massive damage'

The hack is one of the rare examples in which a digital attack caused physical damage. READ MORE

10 cool marketing automation startups to watch (CIO.com)

Marketing automation can help can help businesses better target prospects, find and test new products and services. These 10 startups can help businesses plug gaps in their marketing strategy and offer solutions to problems companies might not even know they have. READ MORE

Microsoft helps boost Android, iOS app performance with offline access

The company is offering a new developer tool to make offline access easier to implement. READ MORE

Hey Microsoft, the Xbox One needs a 'collapse snap' option

The good news is that there's now a Pandora app for the Xbox One. The bad news is that you still need to run it in a snapped window that eats up a bunch of your screen real estate. READ MORE

CARTOON: The Xbox One can't do everything

Some things just shouldn't be done by voice command, particularly during the holidays. READ MORE

WHITE PAPER: Ixia

The Real Secret to Securing your Network

In this white paper, Ixia shares a recommended solution and eye-opening strategies for mitigating security threats. Learn how emerging visibility architectures support your security policies to help bulletproof defenses. Learn more.

BECOME AN ITWORLD INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 7 tips for landing a job at a coding competition

- Data analytics scores marketing wins for the Texas Rangers

- Getting started with power-line networking

DECEMBER GIVEAWAYS

We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Advanced Android Application Development, 4th Edition
This guide provides in-depth explanations of code using key API features and includes downloadable sample apps for nearly every chapter. Together, they provide a solid foundation for any modern app project. Enter now!

Ubuntu Unleashed 2015 Edition: Covering 14.10 and 15.04, 10th Edition
Learn all you need to know about installation, configuration, productivity, multimedia, development, system administration, server operations, networking, virtualization, security, DevOps, and more — including intermediate-to-advanced techniques you won't find in any other book. Enter now!

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.