Thursday, April 25, 2013

IT News Head Lines (InfoWorld) 26/04/2013






Dell corrals acquired products for BYOD market
Dell has pulled together products it gained from recent acquisitions into a series of BYOD (bring your own device) offerings, though it faces the challenge of selling them at a time when the company's ownership hangs in the balance. The offerings are aimed at the hot BYOD market, where vendors are pitching software and services to help manage the influx of personal smartphones and tablets that employees are bringing into corporate networks.

Read More ...




Under the hood of Pivotal One, where cloud dev meets big data
Fueled by a $105 million cash infusion from GE, EMC spin-off Pivotal today drew back the curtain on its next-generation

Read More ...




With revenue at stake, companies seek business-savvy tech workers
Financial concerns in the wake of the recession are causing companies to better align IT and business, and this shift is changing what is expected from technology workers, say executives and staffing professionals. Business acumen is now on par with possessing stellar technical skills, with in-demand employees those who can contribute more than code to the company.

Read More ...




Microsoft re-releases botched patch as KB 2840149, but problems remain
The latest incarnation of Microsoft's MS13-016 patch to ntfs.sys on Vista, Windows 7, Windows Server 2008, and Server 2008 R2 machines appears to work -- or at least it doesn't induce the same bizarre behavior as the e

Read More ...




Recently patched Java flaw already targeted in mass attacks, researchers say
A recently patched Java remote code execution vulnerability is already being exploited by cyber criminals in mass attacks to infect computers with scareware, security researchers warn. The vulnerability, identified as CVE-2013-2423, was one of the 42 security issues fixed in Java 7 Update 21 that was released by Oracle last week.

Read More ...




AP Twitter hack prompts fresh look at cyber security needs
Getting hacked on Twitter is fast becoming a rite of passage for big corporations, but Tuesday's attack on the Associated Press could be a tipping point and shows that social networks must do more to keep their users safe, security experts said. Wider use of two-factor authentication, which can involve an access code being sent to a user on a second device such as a smartphone, is one possible solution. Such a mechanism could be introduced selectively, some experts said, for high profile accounts such as celebrities and large corporations.

Read More ...




Amazon looks to move security appliances to the cloud
Amazon Web Services (AWS) is looking to expand its security offerings with hosted intrusion protection appliances and more extensive encryption features, as it looks to increase the level of protection users can get in its cloud. For Amazon, proving its cloud computing platform can offer the same level of security as traditional hardware and software has been an ongoing challenge.

Read More ...




ZTE agrees to Android, Chrome patent licensing from Microsoft
Microsoft has inked an agreement with China's ZTE for its Android and Chrome patent licensing program. Financial details of deal were not disclosed. But the agreement gives ZTE access to Microsoft patents covering phones, tablets, computers, and other devices running Google's Android and Chrome operating systems.

Read More ...




iPad sales up, Macs flat, as Apple reports Q2 earnings
As some investors feared, Apple on Tuesday reported numbers that were worse than its performance a year ago for the second quarter -- though the company still saw record sales for its March quarter. The company posted $43.6 billion in revenue for the quarter, with net profit of $9.5 billion. That puts earnings at $10.09 per diluted share, down from $12.30 a year ago. In the same quarter last year, Apple reported $39.2 billion in revenue and profit of $11.6 billion.

Read More ...




Know thy cyber enemy: Who's attacking and what they want
China and Romania spawned the most cyber attacks last year, according to an in-depth study released this week by Verizon. Notably, whereas Romanian attackers were primarily prowling for financial data to score a big payday, Chinese perpetrators were engaged in espionage, focused on swiping trade secrets and internal data. Much of the responsibility for successful data breaches in 2012, however, can be pinned on IT's long-standing nemesis: single-factor authentication.

Read More ...






Available Tags:Dell , Microsoft , Java , Twitter , hack , security , Amazon , ZTE , Chrome , iPad , Apple ,

No comments: