Monthly Archives: September 2014

Hack timeline

iCloud Photo Thefts Put Apple, Cloud Data Storage in Cross Hairs

0
iCloud Photo Thefts Put Apple, Cloud Data Storage in Cross Hairs by Don Reisinger It Started With iCloud This hack came about because some household-name celebrities apparently...
Lenovo tablet

Lenovo Unveils Intel-Based Tablet, New Gaming Systems

0
Lenovo is coming into the IFA 2014 show with new offerings that include an Intel-based Android tablet and two gaming systems.The Tab S8 is...
mobile payment

Isis Payment Service Will Become Softcard

0
Officials with Isis, the mobile wallet service that was created by AT&T, Verizon and T-Mobile, two months ago said the company would rebrand to...
Fedora Project

Fedora’s New Project Leader Plots What’s Next

0
On June 3, Matthew Miller was named as the new Fedora Project Leader, succeeding the outgoing Robyn Bergeron. Over the last several months, Miller...
Tech Briefing 903B

Daily Tech Briefing: Sept. 3, 2014

0
This past weekend, attackers posted explicit pictures of Hollywood celebrities online including Oscar winner Jennifer Lawrence, which were allegedly obtained via a vulnerability in...

Samsung Throws a Curve With Galaxy Note Edge

0
NEW YORK—Korean mobile electronics giant Samsung today unveiled the Galaxy Note Edge and Galaxy Note 4 during a press event in New York City's...
IEEE Technologies for 2022

IEEE Picks Top 23 Technologies for 2022

0
IEEE Picks Top 23 Technologies for 2022 by Darryl K. Taft Security Cross-Cutting Issues The growth of large data repositories and the emergence of data analytics have...
IT skills

Google Names 2014 Summer Research Award Winners

0
Google has announced the winners of 110 summer Google Research Awards that will fund the research projects of 110 applicants who sought the company's...
Google Cloud Platform

Google Holding Cloud Platform Live Developer Event on Nov. 4

0
Google will hold another Google Cloud Platform Live event for developers this year on Nov. 4 in San Francisco, following up on the success...
Apple iPhone security

What Apple Needs to Do to Secure Its Users

0
At 2:30 ET on Sept. 2, Apple did something it normally does not do: It issued an emergency media advisory about a security risk...