Jump to content


Photo

Recently seen

tsr66

  • Please log in to reply
173 replies to this topic

#101 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 28 May 2014 - 06:15 AM

"Quote" Ineffective password security practices plague organizations

 

By HNS Staff / Posted on 28 May 2014.

 

Summary: Just over 13 percent of IT security professionals admit to being able to access previous employers’ systems using their old credentials, according to Lieberman Software.

 

Help Net Security /Full Read Here: http://www.net-secur...ld.php?id=16928



#102 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 28 May 2014 - 06:21 AM

"Quote" Police at the door? Hit the PANIC button to erase your RAM

 

By Darren Pauli, 28 May 2014

 

Summary: The next time the police kick down a hackers' door, suspects can reach for the Panic button to make it nigh-on impossible for plod to recover any data, even if they freeze their target PCs.

 

The Register / Full Read Here: http://www.theregist...e_panic_button/



#103 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 29 May 2014 - 06:19 AM

'Quote" 11 top tools for Android road warriors

 

By Anndrew Vacca, InfoWorld, May 29, 2014

 

Summary: Heading out on the road? Be sure you have these critical business apps on your Android device.

 

InfoWorld / Slide Show Here: http://www.infoworld...warriors-243297



#104 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 29 May 2014 - 06:22 AM

"Quote" Amazon plays dirty, E.U. plays ostrich in the bozo parade

 

By Bill Snyder | InfoWorld / MAY 29, 2014

 

Summary: E.U. beats up on free speech and U.S. business competitiveness, while Amazon hits below the belt in negotiations with a book publisher.

 

InfoWorld / full read here:http://www.infoworld...o-parade-243274



#105 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 29 May 2014 - 06:30 AM

"Quote" More security woes keep eBay on edge

 

By Jeremy Kirk
May 28, 2014 06:21 AM ET
 
Summary: Following an attack disclosed last week that exposed sensitive information of up to 145 million people, the auction giant is scrambling to repair several other problems reported in its vast network by security enthusiasts.
 
ComputerWorld / Full Read Here: http://www.computerw...ep_eBay_on_edge


#106 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 29 May 2014 - 06:33 AM

"Quote" Inside the malware war zone

 

by Mirko Zorz - Editor in Chief - Thursday, 29 May 2014.

 

Summary: Adam Kujawa is the Head of Malware Intelligence for Malwarebytes. In this interview he talks about the evolution of malware in the past decade, illustrates the differences in global malware based on the point of origin, highlights the events that changed the threat landscape, offers insight about future threats, and more.

 

Help Net Security / Full Read Here: http://www.net-secur...cle.php?id=2026



#107 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 29 May 2014 - 06:40 AM

"Quote"Hacking for the greater good

 

Author: Zeljka Zorz HNS Managing Editor

 

Summary: As long as people write code, they will write code with flaws, says Katie Moussouris, former Senior Security Strategist Lead at Microsoft Security Response Center and, as of today, Chief Policy Officer of HackerOne, the company that partially hosts the Internet Bug Bounty.

 

Help Net Security / Full Read Here: http://www.net-secur...ld.php?id=16934



#108 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 29 May 2014 - 06:43 AM

"Quote" Misconfiguration to blame for most mobile security breaches

 

By HNS Staff / Posted on 29 May 2014

 

Summary: Nearly 2.2 billion smartphones and tablets will be sold to end users in 2014 according to Gartner, Inc. While security incidents originating from mobile devices are rare, Gartner said that by 2017, 75 percent of mobile security breaches will be the result of mobile application misconfiguration.

 

Help Net Security / Full Read Here: http://www.net-secur...ld.php?id=16932



#109 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 29 May 2014 - 06:46 AM

"Quote" 8 key cybersecurity deficiencies and how to combat them

 

By HNS Staff / Posted on 29 May 2014

 

Summary: While the number of cybercrime incidents and the monetary losses associated with them continue to rise, most U.S. organizations' cybersecurity capabilities do not rival the persistence and technological skills of their cyber adversaries. 

 

Help Net Security / Full Read Here: http://www.net-secur...ld.php?id=16930



#110 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 29 May 2014 - 06:49 AM

"Quote" Biometric tool prevents fraud

 

By HNS Staff / Posted on 29 May 2014

 

Summary: BioCatch launched its eCommerce fraud prevention solution. The new tool uses behavioral biometric analysis to detect suspicious behavior and authenticate repeat customers, while reducing customer friction associated with additional security verifications and checks.

 

Help Net Security / Full Read Here: http://www.net-secur...ld.php?id=16931



#111 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 29 May 2014 - 06:51 AM

"Quote" Cyber crimes smash through Windows into the great beyond

 

By Tom Brewster, 29 May 2014

 

Summary: Windows has been a beleaguered piece of software over the years. That is because malicious hackers, like everyone else, want to walk the simplest path to the greatest glory.

 

The Register / Full Read Here: http://www.theregist..._beyond_the_pc/



#112 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 30 May 2014 - 06:21 AM

"Quote""Using TrueCrypt is not secure" , End of TrueCrypt Development 

 

by Sabari Selvan on Thursday, May 29, 2014

 

Today, security enthusiasts woke up with a shocking news that TrueCrypt has ended its development and warns users that the tool used for encrypting drive is not safe to use. 

 

E Hacking News / full read here:http://www.ehackingn...ure-end-of.html



#113 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 30 May 2014 - 06:29 AM

 " Quote " Malware creation breaks all records! 160,000 new samples every day

 

By: HNS Staff / Posted on  30.05.2014

 

Summary:  Malware creation has broken all records during this period, with a figure of more than 15 million new samples, and more than 160,000 new samples appearing every day, according to Panda Security

Help Net Security / full read here: http://www.net-secur...ews.php?id=2776



#114 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 30 May 2014 - 06:31 AM

" Quote " Keeping your data secure while on the move

 

by Mirko Zorz - Editor in Chief - Friday, 30 May 2014

 

Summary: John Michael is the CEO at iStorage, a provider of secure portable data storage. In this interview he discusses the often overlooked repercussions of data loss, offers tips for organizations to make sure their data is secure even when on the move, and more. /

 

Help Net Security / full read here:http://www.net-secur...cle.php?id=2028



#115 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 30 May 2014 - 06:34 AM

"Quote" Dissecting April's malicious spam

 

By: HNS Staff / Posted on 30.05.2014

 

Summary: Malicious attachments in April came disguised as e-greetings and notifications about faxes. In the case of the former, alleged Easter greetings turned out to be the Fareit.aonw Trojan with fairly limited functionality: it didn't try to steal any passwords, but did download and launch a far more dangerous Zbot Trojan-Spy designed to attack servers and steal personal data.

 

Help Net Security / full read here:http://www.net-secur...ews.php?id=2775



#116 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 30 May 2014 - 06:38 AM

"Quote" Bit9 and Carbon Black join forces against cyber threats

 

By  Helen Gaskell
Published  May 29, 2014
 
Summary: Bit9, a provider of advanced threat protection solutions for endpoints and serversite, has announced its recent merge with security company Carbon Black.
 
itp.net / full read here: http://www.itp.net/5...t-cyber-threats


#117 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 30 May 2014 - 06:42 AM

"Quote" CERT Oz report: 76 orgs popped in targeted attacks

 

By Darren Pauli, 30 May 2014 

 

Summary: Seventy six businesses have owned up to targeted attacks getting past their defences, according to the government's Computer Emergency Response Team (CERT), which released the findings in an annual report late yesterday.

 

The Register / full read here: http://www.theregist...rgeted_attacks/



#118 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 30 May 2014 - 06:44 AM

"Quote" Get UNCRACKABLE quantum keys – from a smartphone

 

By Richard Chirgwin, 30 May 2014

 

Summary: Your smartphone is a quantum device that can be used to generate truly random keys, according to boffins at the University of Geneva.

 

 

The Register / full read here:http://www.theregist...m_a_smartphone/



#119 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 30 May 2014 - 12:17 PM

"Quote" -What inspired you to start hacking?

 

Author / Zeljka Zorz HNS Managing Editor

 

Summary/ This is a question that Jennifer Steffens, IOActive CEO, often asks hackers she meets on conferences around the world. More often than not, the answer is movies: War Games, Hackers, The Matrix, and so on.

 

Help Net Security / Full Read Here: http://www.net-secur...ld.php?id=16937



#120 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 30 May 2014 - 12:20 PM

"Quote" - Google launches hacker game to train bug 'mercenaries'

 

By Darren Pauli, 30 May 2014 

 

Summary / Google wants to bring new blood into the security bug hunter community with a game launched to test developers' knowledge of cross site scripting (XSS) vulnerabilities.

 

The Register / Full Read Here: http://www.theregist...ug_mercenaries/



#121 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 30 May 2014 - 12:23 PM

"Quote"- Hackers pose as hacks: Iranian crew uses Facebook to spy on US defence bods – report

 

By John Leyden, 30 May 2014

 

Summary / An Iran-based hacking network used fake Facebook and other social media profiles to "befriend" and spy on US lawmakers and defence contractors in the US and Israel, among other targets, according to a new report.

 

The Register / Full Read Here: http://www.theregist...nian_spy_caper/



#122 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 30 May 2014 - 07:31 PM

"Quote" - 8 key cybersecurity deficiencies and how to combat them

 

By:HNS Staff / posted on 

29 May 2014.

 

Summary/

While the number of cybercrime incidents and the monetary losses associated with them continue to rise, most U.S. organizations' cybersecurity capabilities do not rival the persistence and technological skills of their cyber adversaries.

 

Help Net Security / Full Read Here: http://www.net-secur...ld.php?id=16930



#123 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 30 May 2014 - 07:37 PM

"Quote" Walking through Hack In The Box 2014 Amsterdam

 

By / HNS  Staff posted on 30 May 2014.

 

Summary / This year's Hack In The Box conference is being held at the De Beurs van Berlage, which is an impressive venue located in central Amsterdam. The organization, the presentations and, best of all, the atmosphere are - as usual - fantastic.

 

Help Net Security / Full Read Here: http://www.net-secur...ld.php?id=16936



#124 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 31 May 2014 - 07:34 AM

"Quote" - Strategic security acquisitions: What makes sense?

 

by Dwayne Melancon - CTO at Tripwire - Thursday, 29 May 2014.

 

Summary:

Thanks to a steady stream of high-profile data breaches, a rapidly shifting threat environment, and the recent indictment of 5 members of Chinese People’s Liberation Army “Unit 61398″ for state-sponsored espionage, security is top-of-mind, even in the boardroom.

 

 

Help Net Security / http://www.net-secur...cle.php?id=2027



#125 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 31 May 2014 - 07:43 AM

" Quote " Facebook Zuckerberg summoned by Iranian court

 

By Stephen McBride May 28, 2014

 

 

Summary /

An Iranian court has summoned Facebook Inc's CEO Mark Zuckerberg to answer allegations of privacy violation, Reuters reported.

 

itp.net / http://www.itp.net/5...y-iranian-court



#126 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 31 May 2014 - 04:35 PM

" Quote " -

5 ways computer security has truly advanced

 

By Roger A Grimes / InfoWorld

 

 

Summary:

Security isn't all gloom and doom. Amid the progress today, these four developments in particular have made us safer

 

InfoWorld / http://www.infoworld...advanced-243090



#127 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 31 May 2014 - 04:40 PM

"Quote" Snowden shoots back: 'So you DO have my emails, after all'

 

By Neil McAllister, 30 May 2014

 

Summary / Edward Snowden says the US National Security Agency is lying when it says it has no record of his emails to supervisors raising concerns about NSA surveillance programs, and that the release of one of his emails on Thursday proves it.

The Register / http://www.theregist...ails_after_all/



#128 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 31 May 2014 - 04:45 PM

"Quote " /Paywave cards lead fraud rise

 

By Darren Pauli, 29 May 2014

 

Summary / Victoria Police's top brass have criticised Australian banks for a rise in contactless credit card fraud arising from stolen tap and go cards.

 

The Register / http://www.theregist...t_need_to_skim/



#129 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 01 June 2014 - 05:56 AM

"Quote" Backlash over Facebook's 'listening' feature is a problem of trust

 

By Zach Miners
May 30, 2014 08:36 PM ET

The social network is in the doghouse again, this time for an upcoming feature that will allow it to listen in on its users via their smartphone's microphone. But the backlash might reveal more about people's declining trust in Facebook than about the feature itself.

Summary:

 

ComputerWorld / http://www.computerw...roblem_of_trust



#130 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 01 June 2014 - 05:59 AM

"Quote" Trend Micro helps Facebook with cyber threats

 

By  Helen Gaskell Published  June 1, 2014

 

Summary / Trend Micro has today announced it has expanded its partnership with Facebook to incorporate a royalty-free security solution, which will help to detect malware and keep devices secure.

 

itp.net / http://www.itp.net/5...h-cyber-threats



#131 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 01 June 2014 - 09:25 PM

"Quote" Your devices Heartbleeding - again

 

By Richard Chirgwin, 2 Jun 2014

 

Summary / Heartbleed is still offering rich pickings for security researchers, and presumably hackers, with Luis Grangeia of Sysvalue demonstrating attacks against wireless (and some wired) networking infrastructure using libraries linked to vulnerable OpenSSL versions.

 

The Register / http://www.theregist...bleeding_again/



#132 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 02 June 2014 - 06:39 AM

"Quote" Beware the next circle of hell: Unpatchable systems

 

By Paul Roberts | InfoWorld / June 02, 2014

 

Summary / Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling.

 

InfoWorld / http://www.infoworld...-systems-243397



#133 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 02 June 2014 - 06:42 AM

"Quote" It's time we hold companies responsible for data breaches

 

By Paul Venezia | InfoWorld / June 02, 2014

 

Summary / Data security regulation is the only measure keeping retailers from burning us all, over and over again

 

InfoWorld / http://www.infoworld...breaches-243458



#134 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 02 June 2014 - 07:19 AM

"Quote" Open Crypt Audit Project considers taking over development of TrueCrypt

 

Author / Zeljka Zorz HNS Managing Editor

 

Summary / he unexpected notice saying TrueCrypt isn't safe, which has apparently been posted last week by the developers of the software, took the security community by surprise and had opened the door for a lot of speculations.

 

Help Net Security / http://www.net-secur...ld.php?id=16944



#135 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 02 June 2014 - 07:25 AM

"Quote" IBM eliminates fraudulent behavior in the cloud

 

By / HNS Staff / Posted on 02 June 2014.

 

Summary/ IBM has patented a technique that helps online and cloud-based businesses improve their ability to eliminate fraud by analyzing browsing behavior to determine whether customers are who they say they are after accessing a website or app via a computer, tablet or other mobile device.

 

Help Net Security / http://www.net-secur...ld.php?id=16940



#136 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 02 June 2014 - 09:05 AM

"Quote" OS X Mavericks will power 70% of Macs before it's replaced by today's upgrade

 

By Gregg Keizer
June 2, 2014 10:04 AM ET

 

Summary / Computerworld - With Apple poised to introduce its next version of OS X within hours, the current edition, Mavericks, will end its career this fall powering almost three-fourths of all Macs, a validation of Apple's decision last year to give away the operating system.

 

ComputerWorld / http://www.computerw...today_s_upgrade



#137 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 02 June 2014 - 01:00 PM

"Quote" International action against Gameover Zeus botnet and CyptoLocker ransomware

 

BY: HNS Staff / Posted on 02.06.2014

 

Summary / On Friday, 30 May 2014, law enforcement agencies from across the world, supported by the European Cybercrime Centre (EC3) at Europol, joined forces in a coordinated action led by the FBI which ensured the disruption of the Gameover Zeus botnet and the seizure of computer servers crucial to the malicious software known as CryptoLocker.

 

Help Net Security / http://www.net-secur...ews.php?id=2777



#138 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 02 June 2014 - 06:43 PM

"Quote" VMware strikes back at Amazon cloud Trojan Horse with ... blog post

 

By Jack Clark, 2 Jun 2014

 

Summary / Last Friday, Bezos & Co. announced the "AWS Connector for vCenter" plug-in, which lets admins buy, manage, and migrate Amazon Web Services cloud VMs from within the familiar vCenter admin environment.

 

The Register / Full Read Here: http://www.theregist...nter_marketing/



#139 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 02 June 2014 - 06:45 PM

"Quote" Apple CEO Cook lashes out at Android's 'hellstew' of malware

 

By Rik Myslewski, 2 Jun 2014

 

Summary/ WWDC Apple CEO Tim Cook took a few minutes of his two-hour keynote at Apple's Worldwide Developers Conference (WWDC) on Monday morning in San Francisco to stick his thumb in Android's eye..

 

The Register/ Full Read Here: http://www.theregist...tew_of_malware/



#140 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 03 June 2014 - 06:52 AM

"Quote" 5 lessons from companies that get computer security right

 

By Roger A. Grimes | InfoWorld / Posted June 03, 2014

 

Summary / Computer security is in tatters -- but not everywhere. Learn from the companies that know what they're doing.

 

InfoWorld / Full Read Here: http://www.infoworld...ty-right-243407



#141 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 03 June 2014 - 07:05 AM

"Quote" Remember Anna Kournikova? Come with us on a tour of bug-squishing history

 

By Tom Brewster,Posted on  3 Jun 2014

 

Summary/ It is the name of the first PC virus, dating back to 1986. The two Pakistani brothers, Basit and Amjad Farooq Alvi, who wrote it did not have malicious intentions: they simply wanted to scare people running pirated versions of the software they were pushing out of their shop in Lahore.

 

The Register/ Full Read Here: http://www.theregist...urity_overview/



#142 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 03 June 2014 - 07:07 AM

"Quote" Feds charge 30-year-old alleged to be lord of Gameover botnet

 

By John Leyden, Posted on  3 Jun 2014

 

Summary/ A US indictment has been unsealed against an alleged cybercrime mastermind following an FBI-led takedown operation that disrupted the internet infrastructure upon which the Gameover ZeuS botnet and the CryptoLocker ransomware had been running.

 

The Register/ Full Read Here:http://www.theregist...ocker_takedown/



#143 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 03 June 2014 - 01:10 PM

"Quote" DARPA crazytech crew want to create HUMAN-FREE cyber defence systems

 

By Jasper Hamill, Posted on  3 Jun 2014

 

Summary / American secret squirrel military research outfit DARPA has launched a competition to find the autonomous cyber-defence systems of the future.

 

The Register/ Full Read Here: http://www.theregist...efence_systems/



#144 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 03 June 2014 - 01:15 PM

"Quote" REVEALED: GCHQ's BEYOND TOP SECRET Middle Eastern INTERNET SPY BASE

 

By Duncan Campbell, Posted on  3 Jun 2014

 

Summary/ Exclusive Above-top-secret details of Britain’s covert surveillance programme - including the location of a clandestine British base tapping undersea cables in the Middle East - have so far remained secret, despite being leaked by fugitive NSA sysadmin Edward Snowden.

 

The Register/ Full Read Here: http://www.theregist...ernet_spy_base/



#145 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 03 June 2014 - 01:19 PM

"Quote" Snooping, RAT-flinging, hack-happy crew targeting governments worldwide – researchers

 

By John Leyden, Posted on  3 Jun 2014

 

Summary/ he Middle East-based Molerats hacker crew are even more active than first suspected, according to a report by researchers who claim the team has launched attacks against an unnamed US financial institution and multiple European governments.

 

The Register/ Full Read Here:http://www.theregist...ats_cyberspies/



#146 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 03 June 2014 - 01:24 PM

"Quote" More developers looking to keep TrueCrypt alive

 

Author / Zeljka Zorz HNS Managing Editor / Posted on 03 June 2014.

 

Summary/ The news that the developers of TrueCrypt have abandoned the popular software has hit the security community like a ton of bricks, but there is apparently no lack of people who are eager to take on the responsibility.

 

Help Net Security/ Full Read Here: http://www.net-secur...ld.php?id=16949



#147 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 03 June 2014 - 02:46 PM

"Quote" If you squint, Oracle is starting to look like a cloud company

 

By Jack Clark, Posted on  3 Jun 2014

 

Summary / Oracle is waking up to the money-spinning possibilities of the cloud and has injected some powerful new capabilities into its "Oracle Enterprise Manager" software.

 

The Register/ Full Read Here: http://www.theregist...se_manager_12c/



#148 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 03 June 2014 - 02:49 PM

"Quote" ACN Summit: the dark cloud

 

By  Helen Gaskell Published  June 3, 2014

 

Summary / The senior advisor of IT and security, CCD and SOC, office of the assistant for security affairs - KSA ministry of interior, today presented on "the dark cloud', which he described as a very dangerous cancer, at the ACN enterprise computing summit 2014.

 

itp.net / Full Read Here:http://www.itp.net/5...-the-dark-cloud



#149 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 03 June 2014 - 03:01 PM

" Quote"  Apple is serious about removing the distinction between desktop and mobile

 

By Galen Gruman | InfoWorld Posted on June 02, 2014

 

Summary / It's not exactly been a secret that Apple sees iOS and OS X as points in a continuum, with increasingly similar user interfaces, standard applications, and pan-device services like iCloud, iMessage, iTunes, and Maps. But Apple left no doubt today with its announcements of OS X 10.10 Yosemite and iOS 8, to be released this fall at no charge, that its device future assumes you'll work on several devices as if they were multiple windows into the same computing space

 

InfoWorld/ Full Read Here: http://www.infoworld...d-mobile-243575



#150 tsr66

tsr66

    Advanced Member

  • Full Member
  • PipPipPip
  • 234 posts

Posted 03 June 2014 - 03:04 PM

"Quote" Mobile and PC management: The tough but unstoppable union

 

By Galen Gruman | InfoWorld Posted on June 03, 2014

 

Summary/ One day, you'll manage all client devices from a central policy console, but it won't be a fast or easy journey.

 

InfoWorld/ Full Read Here: http://www.infoworld...le-union-243255






Member of UNITE
Support SpywareInfo Forum - click the button