Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Innovation Competitions Grow | Malware Exploits Boston Bombings

InformationWeek Daily
InformationWeek Daily  
  Thursday, April 18, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
Between The Lines Columnist Malware Attackers Exploit Boston Marathon Bombing
By Mathew J. Schwartz
Now, 40% of all spam on the Internet name-drops the tragedy to trick users into executing malicious files or visiting sites that launch drive-by attacks.

Java 7 Malicious App Warning System Draws Criticism
SMS Spam Delivers More Malware, Scams

As Innovation Competitions Grow, Prize Money Shrinks
Latest crowdsourced contests aim to attract data scientists with $100,000 prizes -- not yesterday's millions.

Intel Buys Mashery For API Management Expansion
Mashery manages APIs for Aetna, Best Buy and The New York Times.

DOD Moves Forward With Cloud Broker Plans
DISA gets "initial operating capability" to act as Defense Department's cloud services broker.

Samsung Galaxy S 4 Details Surface
Several U.S. carriers have announced pricing and availability details for the Samsung Galaxy S 4 launch.

EHR Incentive Program Is Off Track, Senators Say
Report says Obama administration should "reboot" program and delay later stages of Meaningful Use.

VMware Adds Interoperability With Ubuntu OpenStack Cloud
The next Ubuntu release, coming soon, will include VMware plug-ins for the Quantum networking platform in OpenStack.

NASA Funds Propulsion System For Asteroid Mission
Space Technology group looking at solar sails, asteroid capture among initial assignments.

ACLU Seeks Carrier Smackdown Over Android Updates
ACLU urges FTC to let consumers return carrier-supplied Android devices for full refund or exchange within two years if they don't get regular security updates.

Google Apps Service Restored
Service disruption that affected a small percentage of Google Apps customers on Wednesday has been resolved; Google has no statement on cause.

"Freedom is nothing but a chance to be better." -- Albert Camus

Download our iPad App
NEW Best of Interop Finalists Announced!
Big Data: Hype Vs. Hope At Interop
InteropNet's Live Wire Act

Exclusive for IWK Readers:
Attend Interop and help Build IT Innovation. Click here or use Priority Code MP_BTMNLIWKDLY to save an additional $200 off advanced pricing on All Access and Conference Passes. Join us for access to 125+ workshops and conference classes, 300+ exhibiting companies, and the latest technology.

see also...
Why You Should Attend Interop

Download our iPad App

Posted By TreeInMyCube:
"I am not disagreeing that 'companies that fail to consider it will be at a disadvantage' But considering PaaS is a long, long, long way from embracing PaaS as 'the future.'"
In reply to: "Why PaaS Is The Future"
View Entire Response | Post Your Own Reply

  Digital Issue  
People are your most vulnerable endpoint. Make sure your security strategy addresses that fact.

Also in the new, all-digital issue of Dark Reading: Effective security doesn't mean stopping all attackers.

Log In Or Register To Download

2013 Salary Survey: Networking and Data Center Management Salary Survey
Salaries are basically flat for managers and staff in network and data center positions, according to our 2013 U.S. IT Salary Survey. Base salaries rose by a median of less than 2% for staff and management vs. 2012. In other words, the weak economic recovery is reflected in paychecks for IT pros.
Download Now (Registration Required)

Featured Report
Strategy: Tools And Strategies For File-Level Data Protection
There is nothing in the enterprise that warrants protection more than data, but security pros all too often focus more on perimeter security. In this Dark Reading report we recommend ways that security pros can effectively ensure that data is kept from prying eyes.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
Rule-Driven Profiling: A Next Generation Approach To Vulnerability Discovery
Vulnerability scanning, or the process of identifying a list of known security gaps in the network environment, is the focal point for most enterprise vulnerability management programs. Find out why the use of vulnerability scanners as security assessment tools is nearly ubiquitous in large organizations and what approaches you should be considering.
Download Now (Registration Required)

Organizations Remain Unprepared For DDoS Attacks
DDoS attacks have become highly organized and more complex, which makes them harder and more dangerous to fight than ever. Unfortunately, according to recent UBM Tech research, many companies remain at risk because they rely on inadequate defenses.
Download Now (Registration Required)

6 Skype Alternatives Worth Considering
Skype might be the de facto choice for video and voice calls over the Internet. But here are other options you should explore.

Google Nexus 7, Take Two: What To Expect
Google watchers expect a new version of the 7-inch Nexus tablet to debut soon. Here's what it might look like.

BlackBerry Q10 - The Keyboard to Success?
In a few weeks the BlackBerry 10 with a physical keyboard will be available to buyers. People love the BlackBerry keyboard, but is the device obsolete anyway?

Big Data Analytics Masters Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

Smartphones With Physical Keyboards
Do you want a physical keyboard on your smartphone? The new BlackBerry with a hard keyboard will be here soon, but there are alternatives. Here we show you eight phones, including six not from BlackBerry.


6 Skype Alternatives Worth Considering
Skype might be the de facto choice for video and voice calls over the Internet. But here are other options you should explore.   View Now

10 Best And Worst Cellphones Of All Time
Nine Things Smartwatches Need To Succeed


spacer spacer spacer
Bob Metcalfe Plans Ethernet's 40th
The 'Father of Ethernet' comes back to PARC, the scene of the crime, to talk about Ethernet's future -- including a 40th birthday bash in May.   Watch

CES 2013: It's A Wrap!
CES; the car show



Choosing An Approach To Data Integration And Governance In A Big Data World
Join Gartner analyst Eric Thoo on Tuesday, April 23, as he describes four different approaches to data integration. Eric will map the different approaches to five key use cases to help you identify the capabilities you need and provide insights into evolving data integration challenges and the capabilities that are emerging to address them. More Information & Registration

Click here


Take Our Mobile Security Survey -- You Could Win A Tablet!
InformationWeek is conducting a survey to determine the types of measures and policies IT is taking to ensure the security of the full range of mobile assets on cellular, Wi-Fi and other wireless technologies. One lucky participant will win a 32GB Google Nexus 7 tablet!
Survey ends April 19

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.