Daily Video: Apple Reportedly Eyeing Electric Car Production

 
 
By eWEEK Staff  |  Posted 2015-02-23 Print this article Print
 
 
 
 
 
 
 

Apple reportedly eyeing electric car production; Apple Watch 'premium' versions could get pricey; EMC adds new options for navigating data lakes; and there's more.

 
Facebook Starts 'Journalism Project' to Curb Fake News

DAILY VIDEO: Facebook unveils ambitious project to clean up news feeds; Google rolls out new cloud...

Yahoo to Emerge from Verizon Sale Under New Name: 'Altaba

DAILY VIDEO: CEO, co-founder to leave Yahoo, now known as Altaba; DHS designates election machines,...

Hacker Enters Guilty Plea to Attacks on U.S. Intelligence Officials

DAILY VIDEO: Hacker pleads guilty to attacks against U.S intelligence officials; Google spinoff...

MongoDB Databases Hit by Multiple Groups of Ransomware Attackers

DAILY VIDEO: MongoDB ransomware impacts over 10,000 databases; Labor Department sues Google demanding...

FTC Sues D-Link Over Security Flaws in Routers, IP Cameras

DAILY VIDEO: FTC claims D-Link routers and IP cameras are leaving consumers at risk; Microsoft...

Red Hat Improves Hybrid Cloud Management With CloudForms 4.2

DAILY VIDEO: Red Hat CloudForms 4.2 Improves Hybrid Cloud Management; Virtual Reality-Enabled Windows...

DHS-FBI Report Provides Details on Russian Hacks of U.S. Targets

DAILY VIDEO: DHS-FBI report details Russian malicious cyber activity; U.S. prosecutors charge three...

Amazon Refuses to Give Police Echo Digital Assistant User Transcripts

DAILY VIDEO: Amazon resists warrant for Echo digital assistant user transcripts; South Korea fines...

Congressional Study Concludes Strong Encryption Important for Economy

DAILY VIDEO: Congressional study backs strong encryption essential for U.S. economy; Container...

Security Flaws Detected in Panasonic Airline Entertainment System

DAILY VIDEO: Security vulnerabilities found in airline entertainment systems; Akamai acquires...



Read more about the stories in today's news:

 
 
 

Apple is looking to diversify its business into electric car production, possibly by as soon as 2020, as the company explores new business opportunities outside of its core consumer technology and PC, tablet and smartphone businesses.

The New York Times reported that Apple has been recruiting about 200 people from both inside the company and from competitors like Tesla to help them develop new electric cars.

The Apple Watch is priced at $349, which sounds reasonable compared to the prices of competing watches from LG, Sony, Motorola and other manufacturers.

However, premium versions of the Apple Watch— which could sell for as much as $5,000 or $8,000 or more— are being touted in some industry reports. This is leading some to wonder if there is a market for such pricey watches and if these premium versions will be worth the cost.

Data lakes are the newest hot-button term in the IT business world. These are massive, easily accessible, centralized repositories of large volumes of structured and unstructured data. EMC has had its own Data Lake Foundation strategy for several months, and recently made a few announcements about it.

For example, the new Isilon HD400 allows customers to scale their data lakes to 50 PB within a single cluster. Also, EMC announced a new version of its OneFS operating system, v7.2, which supports newer and more current versions of Hadoop protocols.

Organizations around the world have deployed a wide range of technologies to protect network infrastructure and endpoints from security risks.

Technology, however, isn't the only risk that needs to be secured. A new report from Intel Security, titled "Hacking the Human Operating System," explained the role of social engineering within cyber-security. Intel Security explains that there are two main types of social engineering attacks: hunting and farming.

In hunting attacks, the culprits are looking to gain information and exploit the user with minimal interaction while. In farming attacks, the malicious hackers seek to build a relationship with the victim and then extract information over time. Email is a leading culprit in attack vectors for all types of social engineering.

 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel