Daily Tech Briefing: Oct. 3, 2014

 
 
By Eweek Staff  |  Posted 2014-10-03 Print this article Print
 
 
 
 
 
 
 

Shellshock vulnerability spreads to NAS devices; Microsoft invites 'insiders' to preview windows 10; ARM develops free OS for Internet of Things; and more.

 
Verizon, Yahoo Agree to Reduce Buyout Price to $4.55 Billion

DAILY VIDEO: Verizon negotiates down to $4.55B for Yahoo transaction; Congressional staffers see...

Google Tells RSA Show Audience How it Secures a Billion Android Users

DAILY VIDEO: How Google secures over a billion Android users; Amazon moves into teleconferencing...

Oracle Appeals Ruling in Java Infringement Dispute With Google

DAILY VIDEO: Oracle revives Java copyright infringement dispute with Google; Apple to Mark Smartphone...

Trump Administration Holds Back Executive Order on Cyber-Security

DAILY VIDEO: White House withholds cyber-security order for further revision; Cortana to help Windows...

Kaspersky Finds New Malware Designed to Hide in Memory, Steal Data

DAILY VIDEO: Kaspersky discovers new malware designed to stealthily steal data; Microsoft to shield...

U.S. Court Orders Google to Turn Over Data Stored on Overseas Servers

DAILY VIDEO: Federal court says Google must turn over data in foreign servers; Cisco report: mobile...

Leak of Windows 10 Cloud Suggests Microsoft Readying Chrome OS Fighter

DAILY VIDEO: Windows 10 Cloud leak points to potential Chrome OS fighter; TiVo's analytics pinpoint...

Google Shuts Down Short-Lived Hands Free Mobile Payment App

DAILY VIDEO: Google drops hands free mobile payment app; Microsoft Outlook on iOS welcomes Evernote...

Snap Inc. Files for an IPO Worth an Estimated $3 Billion

DAILY VIDEO: Snap Inc. makes it official, will go public next month; Microsoft sharpens Edge browser...

Google Wins Appeal of 'Right to Be Forgotten' Case in Japan

DAILY VIDEO: Japan's supreme court backs Google in 'right to be forgotten' case; HPE acquires...



Read more about the stories in today's news:

 
 
 

Shellshock, the vulnerability in the Bourne Again Shell, also known as Bash, is now being actively exploited in network-attached storage or NAS devices, according to a new report from FireEye.

Bash is widely deployed on Linux operating systems, which are found in a wide variety of embedded devices, including NAS appliances. Currently, FireEye is only aware of attacks targeting the products of a single NAS vendor, QNAP, which has already issued a patch. The attacks monitored by FireEye were against universities and research institutes in Korea, Japan and the United States.

Microsoft has introduced pre-release builds of Windows 10 ahead of the operating system's expected 2015 launch to members of what the company calls the Windows Insider community.

These "insiders," which includes software developers, technical analysts, corporate IT staff and other likely early adopters of the operating system, can now download Windows 10 Technical Preview, and the Enterprise edition. As with most pre-release software, those who choose to adopt the software early should be prepared for bugs.

ARM is flexing its software muscles with a new platform and operating system for the Internet of things. The company is leveraging the work it has done over the past several years with the mbed hardware and software ecosystem to create the ARM mbed IoT Device Platform, which includes a free operating system for devices powered by systems-on-a-chip.

This platform is based on the vendor's Cortex-M design and the mbed Device Server to help connect the devices and send the data they generate to the cloud for analysis

U.S. law enforcement officials have caught four hackers that were accused of infiltrating the networks of Microsoft; video game makers Epic Games, Valve and Zombie Studios, and even the U.S. Army, according to the U.S. Department of Justice.

The 18-count indictment charged the hackers with stealing more than $100 million in intellectual property. An FBI-led investigation showed that the hackers employed methods such as SQL injection and the use of stolen usernames and passwords of company employees and their software development partners to gain access to victims' computers.

 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel