Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud

    Amazon’s Whole Foods Purchase to Accelerate Move Into Grocery Business

    By
    eWEEK Staff
    -
    June 20, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Today’s topics include Amazon’s proposed $13.7 billion purchase of Whole Foods, a FireEye report on the hacker group FIN10, HP’s efforts to raise customer awareness about the security risks posed by aging network printers and a report by tCell on mass vulnerabilities in Web application designs. 

      Amazon’s proposed $13.7 billion purchase of Austin, Texas-based grocery chain Whole Foods will broaden the capabilities of its Amazon Fresh grocery delivery service and push the company to become a top competitor in food retail. By pairing with Whole Foods, Amazon hopes to solve such customer complaints as inaccessibility, expense and delayed delivery.

      A prominent reason for the acquisition is the similar demographics the companies share—largely higher income shoppers and millennials who are tech-savvy. The purchase will also immediately supply Amazon with 431 stores far faster and in far more communities than it could ever acquire on its own.

      In addition, the buyout will provide Amazon with grocery business and marketing knowledge, as well as access to the suppliers that Amazon Fresh needs to become a major player in the food retail industry.

      Security firm FireEye released a report last week that details the activities and techniques utilized by the FIN10 hacker group, which has been exploiting mining companies and casinos since at least 2013.

      FireEye’s analysis shows the cyber-extortion group uses publicly available software and techniques to exploit victims instead of relying on zero-day vulnerabilities. After infiltrating an organization, FIN10 steals data and then threatens the victims that the data will be publicly released or that IT systems will be disrupted.

      Charles Carmakal, vice president with FireEye’s Mandiant cybersecurity consulting group, confirmed that “all of the known compromised organizations are based in Canada.”

      HP is raising customer awareness about the security risks posed by aging network printers, and the solutions it has to offer.

      Printers represent a network vulnerability, Enrique Lores, president of HP’s imaging and printing business, said during the company’s Power of Print event last week. HP’s efforts to raise awareness include a series of online short films by HP Studios that dramatize the security threat posed by printers.

      HP started developing security technology years ago in hopes it would be a key differentiator for its products, including its printers. HP has invested to make sure its printers were the most secure in the planet, and the company has gone through a lot of legal checks to make sure it can say that, Lores said. What HP has done is integrate all the technology it has developed for PCs, servers and network equipment and integrated it to the printers for the same level of security.

      According to data collected by tCell, an application-security firm, the vast majority of Web applications are vulnerable to cyber-attack because developers continue to leave behind unused code, work with third-party libraries and allow code frameworks to make requests for content from third-party sites.

      Based on observations made during real-world attacks, tCell reported to eWEEK that more than 90 percent of companies have unused code in their applications that could be exploited and 88 percent of companies have Web applications that use vulnerable third-party libraries.

      “This is important, because once you have a really good handle on the risk profile of the application, then you can start implementing policies to secure the application,” Michael Feiertag, CEO and co-founder of tCell, told eWEEK.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×