Daily Tech Briefing: Oct. 3, 2014

 
 
By Eweek Staff  |  Posted 2014-10-03 Print this article Print
 
 
 
 
 
 
 

Shellshock vulnerability spreads to NAS devices; Microsoft invites 'insiders' to preview windows 10; ARM develops free OS for Internet of Things; and more.

 
Google Tablet, Laptop to Run Android, Chrome OS Hybrid: Report

DAILY VIDEO: Google plans tablet and laptop running Android, Chrome OS hybrid; Salesforce releases...

Windows Server 2016 Debuts at Microsoft Ignite Conference

DAILY VIDEO: Microsoft's Windows Server 2016 debuts at Ignite conference; Docker now runs on Windows...

Salesforce, Other Suitors Reportedly Considering Twitter Buyout

DAILY VIDEO: Salesforce reportedly considering buying Twitter; Apple unveils public version of iOS...

Apple iPhone 7 Users Report 'Hissing' Noise That May Prove Innocuous

DAILY VIDEO: "Hissing" iPhone 7s reported, but that may be a normal noise; Microsoft delivers Version...

Google Smartphone, VR Headset Expected to Debut at Oct. 4 Event

DAILY VIDEO: Google expected to unveil smartphone, VR headset at Oct. 4 event; Ellison claims...

Samsung Says Green Charging Light Hallmark of Safe Note7 Handsets

DAILY VIDEO: Samsung Note7 recall update: How to ID a non-defective handset; Oracle launches a major...

Google to Roll Out Allo Messaging App on Sept. 21: Report

DAILY VIDEO: Google reportedly launching Allo messaging app Sept. 21; Intel, GE partner to make...

iPhone 7 Plus So Far More Popular Than iPhone 7

DAILY VIDEO: iPhone 7 sales patterns contrast with those of iPhone 6 and 6s; mobile carriers unveil...

Apple Says iPhone 7 Sales Start With Some Models Already Sold Out

DAILY VIDEO: Apple says some iPhone 7 models are already sold out; Qualcomm pushes for more dual...

Apple Says It's Fixed iOS 10 Bug That Disabled Some iPhones, iPads

DAILY VIDEO: Apple's new iOS 10 update disables iPhones, iPads for some users; Samsung to limit Note7...



Read more about the stories in today's news:

 
 
 

Shellshock, the vulnerability in the Bourne Again Shell, also known as Bash, is now being actively exploited in network-attached storage or NAS devices, according to a new report from FireEye.

Bash is widely deployed on Linux operating systems, which are found in a wide variety of embedded devices, including NAS appliances. Currently, FireEye is only aware of attacks targeting the products of a single NAS vendor, QNAP, which has already issued a patch. The attacks monitored by FireEye were against universities and research institutes in Korea, Japan and the United States.

Microsoft has introduced pre-release builds of Windows 10 ahead of the operating system's expected 2015 launch to members of what the company calls the Windows Insider community.

These "insiders," which includes software developers, technical analysts, corporate IT staff and other likely early adopters of the operating system, can now download Windows 10 Technical Preview, and the Enterprise edition. As with most pre-release software, those who choose to adopt the software early should be prepared for bugs.

ARM is flexing its software muscles with a new platform and operating system for the Internet of things. The company is leveraging the work it has done over the past several years with the mbed hardware and software ecosystem to create the ARM mbed IoT Device Platform, which includes a free operating system for devices powered by systems-on-a-chip.

This platform is based on the vendor's Cortex-M design and the mbed Device Server to help connect the devices and send the data they generate to the cloud for analysis

U.S. law enforcement officials have caught four hackers that were accused of infiltrating the networks of Microsoft; video game makers Epic Games, Valve and Zombie Studios, and even the U.S. Army, according to the U.S. Department of Justice.

The 18-count indictment charged the hackers with stealing more than $100 million in intellectual property. An FBI-led investigation showed that the hackers employed methods such as SQL injection and the use of stolen usernames and passwords of company employees and their software development partners to gain access to victims' computers.

 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel