What to avoid in Dropbox-related phishing attack

Corporate employees familiar with Dropbox should take extra precautions to avoid becoming a victim of a phishing attack that uses the popular file-sharing service. Cybercriminals have been sending out emails with malicious links pointing to a ZIP file on Dropbox that contains a screensaver that is actually ransomware similar to one known as CryptoLocker, security vendor PhishMe reported Friday. The attackers try to trick the recipients into clicking on the link through a variety of ploys, including disguising the email, so that the link appears to point to an invoice or…

Read More

SAP Needs Culture Change To Battle Cloud Upstarts NetSuite, Workday

SAP’s biggest challenge in reshaping itself into a provider of online business applications is changing the corporate culture that made it one of the largest software makers on the planet. The technological shift is well on its way. SAP’s flagship Business Suite is available online through the HANA Enterprise Cloud. HANA is SAP’s in-memory database–a key piece of the company’s cloud platform. “They’ve made a lot of strides technically to get things to the cloud,” Henry Morris, analyst for IDC, said. But SAP must also navigate a changing purchasing landscape in which technology…

Read More

CIA joins Facebook and Twitter

US spy agency the CIA has joined the world of social media, setting up Facebook and Twitter profiles The CIA, which has long trolled social media to try to uncover global trends and track evil-doers, officially joined Twitter and Facebook last week. The spy agency cast the move as an effort to better get out its message and engage directly with the public, but its first Twitter message, sent out shortly before 2 p.m. EDT (1800 GMT), did not indicate there would be major revelations. It said simply: “We can…

Read More

HP Introduces Thin Client Solutions Delivering Increased Performance and Flexibility for Cloud Environments

PALO ALTO, Calif. — HP today expanded its leading portfolio of thin client solutions with the HP t310 All-in-One Zero Client and HP t520 Flexible Series Thin Client, designed to help businesses securely support virtual work environments. HP also announced updates to its embedded Linux Operating System (OS) for Thin Clients, HP ThinPro 5.0, which features a new user interface and increased flexibility to move between the HP ThinPro OS and HP Smart Zero cores. Businesses demand technology that helps employees stay productive across an organization’s different workgroups and between offices. IT managers must…

Read More

Maps: 15 apps that take you beyond Google and Apple

Open Street Map Open Street Map is an open source map of the world, created and amended by people all over the planet. It emphasizes local knowledge, so if you’re in a city and know of a new route or location, you can feel free to add it. There are many types of contributors, from mapping enthusiasts, to professionals, to humanitarians that help add things during disasters. The map shown here was listed as a great example of a community-made map of Pompeii, Italy. Image: Open Street Map Citymaps Citymaps is a…

Read More

Heartbleed 2: OpenSSL Shows More Security Flaws

Companies still patching computers that contain theHeartbleed bug now have to contend with other flaws found in the OpenSSL encryption protocol that secures data flowing between PCs and Web servers. The latest bugs in the open-source OpenSSL cryptography library include one that would let an attacker eavesdrop on traffic between a client and server. So-called man-in-the-middle attacks typically involve the hacker decrypting and modifying traffic to manipulate the data flow to his own benefit, such as stealing credentials to online services. The latest flaw is less of a risk than Heartbleed,…

Read More

Windows Phone, the Next Generation: Small, Colorful, Obscure

Since the Nokia Lumia 1520’s six-inch display has the Windows Phone phablet market seemingly locked up, a number of Microsoft’s new Asian partners are going small. Since the Nokia Lumia 1520’s six-inch display has the Windows Phone phablet market seemingly locked up, a number of Microsoft’s new Asian partners are going small. Three of Microsoft’s newest partners–BLU, Prestigio, and YEZZ–announced new Windows Phones at the Computex show in Taiwan, with several 4-inch phones leading the way. YEZZ even named its phone “Billy” after founder Bill Gates, according to Microsoft. In…

Read More

Is it THE END OF BIG DATA? Quarta Horribilis for high-end storage

People will be talking about the terrible 2014 Q1 for years. IDC has just revealed one of the worst storage quarters for a couple of years as buyers went on a high-end storage strike. There’s been a quite spectacular slump in the storage business in the first 2014 quarter, according to the beancounters’ Storage Tracker. Notwithstanding the digital-universe-drowning-us-in-Big-Data narrative, the actual storage market shrank this quarter. Here’s the bare bones IDC statement: “The total (internal plus external) disk storage systems market generated $7.3 billion in revenue, representing a decrease of -6.9…

Read More

Tech history in photos: Social media founders

Social media is a relatively new phenomenon, but it shapes the daily lives of many internet users. Here are the people behind some of the most important social media sites. Mark Zuckerberg, Facebook Mark Zukerberg is the CEO and one of the original co-founders of Facebook. Facebook was originally only available to university students, but once it opened up to the general public it became the most popular social network in the world. Image: James Martin/CNET Jack Dorsey, Twitter Jack Dorsey is the co-creator and co-founder of Twitter. Twitter was…

Read More

Google testing super-secure email

Google is working on the ultimate security and privacy feature. It’s called “End-to-End” encryption, and it’s the best way to stop anyone from snooping on your emails. Google would turn your emails into jumbled code, and the only person who can see the email in plain text is the trusted person on the other end. Hackers don’t stand a chance. In fact, neither does the National Security Agency. It’s the kind of encryption ex-NSA contractor Edward Snowden used to communicate with journalists before he went public last year with damning…

Read More
error: https://exclusivenews.ogledalo.rs- Content is protected !!