Telecom
News
4/18/2013
12:56 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Innovation Competitions Grow | Malware Exploits Boston Bombings

InformationWeek Daily
InformationWeek Daily  
  Thursday, April 18, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist Malware Attackers Exploit Boston Marathon Bombing
By Mathew J. Schwartz
Now, 40% of all spam on the Internet name-drops the tragedy to trick users into executing malicious files or visiting sites that launch drive-by attacks.

RELATED
Java 7 Malicious App Warning System Draws Criticism
SMS Spam Delivers More Malware, Scams

As Innovation Competitions Grow, Prize Money Shrinks
Latest crowdsourced contests aim to attract data scientists with $100,000 prizes -- not yesterday's millions.

Intel Buys Mashery For API Management Expansion
Mashery manages APIs for Aetna, Best Buy and The New York Times.

DOD Moves Forward With Cloud Broker Plans
DISA gets "initial operating capability" to act as Defense Department's cloud services broker.

Samsung Galaxy S 4 Details Surface
Several U.S. carriers have announced pricing and availability details for the Samsung Galaxy S 4 launch.

EHR Incentive Program Is Off Track, Senators Say
Report says Obama administration should "reboot" program and delay later stages of Meaningful Use.

VMware Adds Interoperability With Ubuntu OpenStack Cloud
The next Ubuntu release, coming soon, will include VMware plug-ins for the Quantum networking platform in OpenStack.

NASA Funds Propulsion System For Asteroid Mission
Space Technology group looking at solar sails, asteroid capture among initial assignments.

ACLU Seeks Carrier Smackdown Over Android Updates
ACLU urges FTC to let consumers return carrier-supplied Android devices for full refund or exchange within two years if they don't get regular security updates.

Google Apps Service Restored
Service disruption that affected a small percentage of Google Apps customers on Wednesday has been resolved; Google has no statement on cause.

QUOTE OF THE DAY
"Freedom is nothing but a chance to be better." -- Albert Camus

Download our iPad App
NEW Best of Interop Finalists Announced!
Big Data: Hype Vs. Hope At Interop
InteropNet's Live Wire Act

Exclusive for IWK Readers:
Attend Interop and help Build IT Innovation. Click here or use Priority Code MP_BTMNLIWKDLY to save an additional $200 off advanced pricing on All Access and Conference Passes. Join us for access to 125+ workshops and conference classes, 300+ exhibiting companies, and the latest technology.

see also...
Why You Should Attend Interop

Download our iPad App

JOIN THE CONVERSATION
Posted By TreeInMyCube:
"I am not disagreeing that 'companies that fail to consider it will be at a disadvantage' But considering PaaS is a long, long, long way from embracing PaaS as 'the future.'"
In reply to: "Why PaaS Is The Future"
View Entire Response | Post Your Own Reply

 Digital Issue 
INSIDE THIS WEEK'S ISSUE OF DARK READING
People are your most vulnerable endpoint. Make sure your security strategy addresses that fact.

Also in the new, all-digital issue of Dark Reading: Effective security doesn't mean stopping all attackers.

Log In Or Register To Download

 

 
REPORTS & WHITEPAPERS
FEATURED REPORTS
2013 Salary Survey: Networking and Data Center Management Salary Survey
Salaries are basically flat for managers and staff in network and data center positions, according to our 2013 U.S. IT Salary Survey. Base salaries rose by a median of less than 2% for staff and management vs. 2012. In other words, the weak economic recovery is reflected in paychecks for IT pros.
Download Now (Registration Required)

Featured Report
Strategy: Tools And Strategies For File-Level Data Protection
There is nothing in the enterprise that warrants protection more than data, but security pros all too often focus more on perimeter security. In this Dark Reading report we recommend ways that security pros can effectively ensure that data is kept from prying eyes.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacerspacerspacer
FEATURED WHITEPAPERS
Rule-Driven Profiling: A Next Generation Approach To Vulnerability Discovery
Vulnerability scanning, or the process of identifying a list of known security gaps in the network environment, is the focal point for most enterprise vulnerability management programs. Find out why the use of vulnerability scanners as security assessment tools is nearly ubiquitous in large organizations and what approaches you should be considering.
Download Now (Registration Required)


Organizations Remain Unprepared For DDoS Attacks
DDoS attacks have become highly organized and more complex, which makes them harder and more dangerous to fight than ever. Unfortunately, according to recent UBM Tech research, many companies remain at risk because they rely on inadequate defenses.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
6 Skype Alternatives Worth Considering
Skype might be the de facto choice for video and voice calls over the Internet. But here are other options you should explore.

Google Nexus 7, Take Two: What To Expect
Google watchers expect a new version of the 7-inch Nexus tablet to debut soon. Here's what it might look like.

BlackBerry Q10 - The Keyboard to Success?
In a few weeks the BlackBerry 10 with a physical keyboard will be available to buyers. People love the BlackBerry keyboard, but is the device obsolete anyway?

Big Data Analytics Masters Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

Smartphones With Physical Keyboards
Do you want a physical keyboard on your smartphone? The new BlackBerry with a hard keyboard will be here soon, but there are alternatives. Here we show you eight phones, including six not from BlackBerry.

 

SLIDESHOWS
6 Skype Alternatives Worth Considering
Skype might be the de facto choice for video and voice calls over the Internet. But here are other options you should explore.   View Now

ALSO SEE
10 Best And Worst Cellphones Of All Time
Nine Things Smartwatches Need To Succeed

MORE SLIDESHOWS
spacerspacerspacer
VIDEOS

Bob Metcalfe Plans Ethernet's 40th
The 'Father of Ethernet' comes back to PARC, the scene of the crime, to talk about Ethernet's future -- including a 40th birthday bash in May.   Watch

ALSO WATCH
CES 2013: It's A Wrap!
CES; the car show

MORE VIDEOS
spacer
 
WEBCASTS
Choosing An Approach To Data Integration And Governance In A Big Data World
Join Gartner analyst Eric Thoo on Tuesday, April 23, as he describes four different approaches to data integration. Eric will map the different approaches to five key use cases to help you identify the capabilities you need and provide insights into evolving data integration challenges and the capabilities that are emerging to address them. More Information & Registration

Click here
 
RESOURCES AND EVENTS
Take Our Mobile Security Survey -- You Could Win A Tablet!
InformationWeek is conducting a survey to determine the types of measures and policies IT is taking to ensure the security of the full range of mobile assets on cellular, Wi-Fi and other wireless technologies. One lucky participant will win a 32GB Google Nexus 7 tablet!
Survey ends April 19



This e-mail was sent to EmailAddress

InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

Comment  | 
Print  | 
More Insights
The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Government, May 2014
NIST's cyber-security framework gives critical-infrastructure operators a new tool to assess readiness. But will operators put this voluntary framework to work?
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.