Hackin9
Apple plans to build a components plant in Mesa, Arizona, that will run entirely on renewable energy.
 
With its powerful data mining capabilities, Hadoop is bringing together people across different places and even across different generations.
 
Google last week again turned the screws on Microsoft and its Office franchise, this time by including Quickoffice with its newest Android mobile operating system, version 4.4 and dubbed "KitKat."
 
A new supercomputer being deployed this month in the U.S. is using solid-state drive storage as an alternative to DRAM and hard drives, which could help speed up internal data transfers.
 
A well-known bookmaker is taking bets on what Google will do with its mystery barges, and so far floating data centers are a shoe-in with some interesting wages coming in as long shots.
 
Proposals in Congress to end the National Security Agency's bulk collection of U.S. telephone records would compromise the agency's ability to find and track terrorists, representatives of the intelligence community said Monday.
 
India is preparing for a Tuesday launch of its first Mars-bound spacecraft, which NASA hopes will complement its efforts on the planet.
 

An online broker for limousine and Town Car services has suffered a hack that spilled financial and personal information for more than 850,000 customers, including real estate mogul Donald Trump, basketball star LeBron James, actor Tom Hanks, and many more of the world's rich and famous, according to a published report.

The data trove was found on the same servers that stored source code for Adobe's ColdFusion and Acrobat applications, fueling speculation that the same hackers may be behind both attacks, KrebsonSecurity's Brian Krebs reported Sunday night. The archive file, which was listed as belonging to a firm called CorporateCarOnline, contained data for 241,000 high- or no-limit American Express accounts, as well as a wealth of personal details about the company's well-to-do clientele, including their pick-up and drop-off locations and travel itineraries.

"This database would be a gold mine of information for would-be corporate spies or for those engaged in other types of espionage," Krebs wrote. "Records in the limo reservation database telegraphed the future dates and locations of travel for many important people. A ridiculously large number of entries provide the tail number of a customer’s plane, indicating they were to be picked up immediately upon disembarking a private jet."

Read 2 remaining paragraphs | Comments


    






 
More Android smartphones are scheduled to hit the market in preparation for holiday sales, including the Samsung Galaxy S 4 Zoom and the Moto G.
 
Apple's new iPad Air got off to a fast start this weekend, according to measurements of its online activity, which was twice the combined shares of 2012's then-new fourth-generation iPad and iPad Mini tablets.
 
Sony Betamax ... the Apple Newton... push technology... Web TV... electric vehicles.... What do all these things have in common? They were all heavily promoted technologies that didn't live up to the hype surrounding them. And they are not alone.
 
of the most important back links inside the security lifecycle is ensuring that workers are educated on security and compliance most effective methods, stated Leo Cole, chief advertising and marketing officer at Trustwave. infusing our program together with the intelligence of Trustwave SpiderLabs as well as the best-practices of our notable compliance teams, Trustwave Safety Training Services support companies augment their technologies investments and fortify their security and compliance posture. Our flexible delivery and personalized courseware helps staff easily take on an active function in reducing risk and enhancing threat reaction, within a way that relates to their certain function inside their business.. canada goose jacktes
 
Hewlett-Packard has announced a multi-year effort to port its Nonstop server systems, used by banks, telcos and other businesses that need maximum reliability, from Intel's Itanium architecture to x86.
 
BlackBerry's appointment Monday of former Sybase CEO John Chen as its next executive board chair and interim CEO could be the best news in months for the struggling smartphone company, analysts said.
 

Google's Chrome team recently came under fire for its long-held practice of making saved passwords visible in plain text. If you hand your computer to a friend or leave it unguarded and unlocked, the friend or a passerby could go into Chrome's settings and view any website passwords you've saved without typing in your system password.

Chrome still makes passwords viewable in plain text by default, but the latest build of Chromium for Mac—the open source browser from which Chrome draws its code—gives users a new way to protect their passwords. If you type chrome://flags into the address bar, you'll find this:

If you enable password manager reauthentication and then restart the browser, the next time you view your list of passwords you'll be prompted to enter the system password before being allowed to view them in plain text:

Read 3 remaining paragraphs | Comments


    






 
LinuxSecurity.com: Multiple vulnerabilities have been found in phpMyAdmin, allowing remote authenticated attackers to execute arbitrary code, inject SQL code or conduct other attacks.
 
LinuxSecurity.com: An unspecified vulnerability in Mednafen could result in the execution of arbitrary code.
 
LinuxSecurity.com: Cedric Krier discovered that the Tryton client does not sanitize the file extension supplied by the server when processing reports. As a result, a malicious server could send a report with a crafted file extension that causes the client to write any local file to which the [More...]
 
LinuxSecurity.com: New mozilla-thunderbird packages are available for Slackware 13.37, 14.0, and -current to fix security issues. [More Info...]
 
LinuxSecurity.com: A flaw was found in the way the Mozilla Network Security Service library (nss) read uninitialized data when there was a decryption failure. A remote attacker could use this flaw to cause a denial of service (application crash) for applications linked with the nss library. [More...]
 
Premier 100 IT Leader Richard Maranville also answers questions on career management.
 
BlackBerry announced Monday that it won't be sold to Fairfax Financial Holdings or any other suitors, and that its CEO Thorsten Heins will resign.
 
Drupal Bean Module Cross Site Scripting Vulnerability
 
Drupal FileField Sources Module Access Bypass Vulnerability
 
Drupal Feed Element Mapper Module Cross Site Scripting Vulnerability
 
Western Digital Monday started shipping a 6TB, helium-filled hard drive that represents a 50% increase in drive capacity over today's largest hard drives.
 
Linux operating system creator Linus Torvalds has proposed that Linux 4.0, an upcoming release of the open-source software, should be dedicated to stability and bug fixing.
 
The first thing you notice when you pick up Apple's new iPad Air is how light it feels. But there's more to the Air than it's new slender look and feel. Michael deAgonia offers his first impressions of the new tablet.
 
Apache Struts Multiple Cross Site Scripting Vulnerabilities
 
WordPress AREA53 Theme 'php.php' Arbitrary File Upload Vulnerability
 
Some careers seem alluring because their luminaries are so visible, but the rank and file can struggle financially. IT has its stars, too, but if you're competent, you can still be well compensated without that status.
 
IT job seekers embrace social media, video and graphics to enhance their resumes and set themselves apart from other job applicants.
 
Many IT leaders seem to have difficulty separating the concepts of power and influence, thinking of the latter as a softer form of power.
 
Is Windows 8.1 better than Windows 8? Yes. Is it any good? No.
 
In another example of the blurred lines between business and personal computing, Whirlpool chose Google Apps because it's convinced that Google's focus on consumers gives it an innovation edge in enterprise software.
 
No one should be surprised by Healthcare.gov's troubled rollout -- the early success rate for large, complex IT projects is very low. Insider (registration required)
 
They're Internet-facing, unpatched machines with no malware protection. How could that ever happen?
 
Apple's decision to give away OS X upgrades and other software, including the iWork productivity suite, is seen as both an offensive and a defensive move that challenges Microsoft to respond.
 
Apple's move to offer its latest desktop operating system for free isn't going to affect the Linux operating system at all, Linux creator Linus Torvalds said.
 
To prevent disruptions and scale up its service while keeping costs down, Twitter has drastically changed its core infrastructure and has adopted some open-source tools.
 
GraphicsMagick 'ExportAlphaQuantumType()' Function Denial Of Service Vulnerability
 
Oracle MySQL Server CVE-2013-5807 Remote Security Vulnerability
 
XSS and CSRF Horde Groupware Web mail Edition
 
CSRF Horde Groupware Web mail Edition
 
[SECURITY] [DSA 2791-1] tryton-client security update
 
XADV-2013003 Linux Kernel eCryptfs write_tag_3_packet Heap Buffer Overflow Vulnerability
 
[slackware-security] mozilla-thunderbird (SSA:2013-307-01)
 
[SECURITY] [DSA 2790-1] nss security update
 
[security bulletin] HPSBMU02931 rev.2 - HP Service Manager, Injection of Arbitrary Code, Remote Privilege Elevation, Remote Disclosure of Privileged Information and Cross Site Scripting (XSS)
 
pdirl PHP Directory Listing 1.0.4 - Cross Site Scripting Web Vulnerabilities
 
Internet Storm Center Infocon Status