Daily Video: Apple Reportedly Eyeing Electric Car Production

 
 
By eWEEK Staff  |  Posted 2015-02-23 Print this article Print
 
 
 
 
 
 
 

Apple reportedly eyeing electric car production; Apple Watch 'premium' versions could get pricey; EMC adds new options for navigating data lakes; and there's more.

 
More than 1 Million Android Devices Infected by 'Gooligan' Trojan

DAILY VIDEO: 'Gooligans' malware infects more than 1.3 million Android devices; Firefox patched for...

Azure Cloud Flaw Posed Hacking Risk to RHEL Virtual Machines

DAILY VIDEO: Microsoft Azure flaw posed RHEL hacking risk; Google explores use of machine learning to...

Microsoft Readying New Smartphone Models for Late 2017, Reports Say

DAILY VIDEO: Microsoft readying new mobile device push in 2017, reports say; Cisco extends security...

San Francisco Transit Agency Gets Back Online After Ransomware Attack

DAILY VIDEO: Cyber-attack knocks out San Francisco transit system fare terminals; Cisco extends...

Recount in Wisconsin Unlikely to Reveal Vote System Fraud, Hacking

DAILY VIDEO: Election recount unlikely to reveal evidence of vote system hacking; Mimecast brings...

Microsoft Sets Sights on Building Practical Quantum Computer

DAILY VIDEO: Microsoft Starts Quantum Computer Development Program; Cerber Ransomware Expands...

Symantec Buys Out Identity Protection Firm LifeLock for $2.3 Billion

DAILY VIDEO: Symantec acquires identity protection vendor LifeLock for $2.3 Billion; Oracle acquires...

Nvidia, OpenAI to Collaborate With Microsoft's AI Efforts

DAILY VIDEO: Microsoft's AI efforts get a boost from Nvidia, Elon Musk's OpenAI; Mozilla introduces...

IBM Launches Security Services Headquarters in Massachusetts

DAILY VIDEO: IBM opens global headquarters for security services; IoT devices evolving rapidly as...

Dell Data Protection Secure Lifecycle Encrypts Data in Motion

Daily Video: Dell data protection defends against external, insider threats; Microsoft Outlook...



Read more about the stories in today's news:

 
 
 

Apple is looking to diversify its business into electric car production, possibly by as soon as 2020, as the company explores new business opportunities outside of its core consumer technology and PC, tablet and smartphone businesses.

The New York Times reported that Apple has been recruiting about 200 people from both inside the company and from competitors like Tesla to help them develop new electric cars.

The Apple Watch is priced at $349, which sounds reasonable compared to the prices of competing watches from LG, Sony, Motorola and other manufacturers.

However, premium versions of the Apple Watch— which could sell for as much as $5,000 or $8,000 or more— are being touted in some industry reports. This is leading some to wonder if there is a market for such pricey watches and if these premium versions will be worth the cost.

Data lakes are the newest hot-button term in the IT business world. These are massive, easily accessible, centralized repositories of large volumes of structured and unstructured data. EMC has had its own Data Lake Foundation strategy for several months, and recently made a few announcements about it.

For example, the new Isilon HD400 allows customers to scale their data lakes to 50 PB within a single cluster. Also, EMC announced a new version of its OneFS operating system, v7.2, which supports newer and more current versions of Hadoop protocols.

Organizations around the world have deployed a wide range of technologies to protect network infrastructure and endpoints from security risks.

Technology, however, isn't the only risk that needs to be secured. A new report from Intel Security, titled "Hacking the Human Operating System," explained the role of social engineering within cyber-security. Intel Security explains that there are two main types of social engineering attacks: hunting and farming.

In hunting attacks, the culprits are looking to gain information and exploit the user with minimal interaction while. In farming attacks, the malicious hackers seek to build a relationship with the victim and then extract information over time. Email is a leading culprit in attack vectors for all types of social engineering.

 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel