2015년 3월 9일 월요일

Here it comes again: the botched Windows 8.1 patch

Today's InfoWorld Headlines: Wrap Up
March 09, 2015

Here it comes again: the botched Windows 8.1 patch

The once-pulled, now-reissued KB 3000850 patch was apparently upgraded to "important," causing many users to wonder what had happened -- and whether they should install it immediately. The short answer: No.
READ MORE
 

Issue highlights

White Paper: EMC

IAM Buyer's Guide: 5 Key Questions to Ask

Learn the 5 key questions that every buyer should ask before purchasing an Identity and Access Management solution. LEARN MORE

Rowhammer hardware bug threatens to smash notebook security

Google's Project Zero team, dedicated to finding severe security vulnerabilities, has released research that shows with certain varieties of DRAM an attacker can create privilege escalations by simply repeatedly accessing a given row of memory.READ MORE

IT jobs made modest gains in February

With only 5,400 new job added in February, the IT market is cooling off somewhat from the booming gains seen in January and most of 2014. The picture may become further complicated when the H-1B visa lottery takes place in April. READ MORE
White Paper: EMC

How Access Governance Makes Data Loss Prevention Successful

Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution. LEARN MORE>>

Ancient help-file format carries new CryptoWall attacks into PCs

More than a decade ago, miscreants pioneered the use of infected CHM files to deliver payloads on unsuspecting Windows users. Recently the scam has taken a very lucrative twist, infecting PCs with CryptoWall ransomware attacks.READ MORE

Free books! 19 no-cost programming guides

Programming books can be costly, but free e-books and PDFs for several languages, frameworks, applications, systems, and disciplines are available. Here are the titles you can use to begin building your reference library. READ MORE
Webcast: EMC

Preventing Data Breaches with Data Access Governance

Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.LEARN MORE>>

댓글 없음:

댓글 쓰기