Healthy fruits

BlackBerry’s latest financial results, which were announced mid-December, show that the company has a lot to do before it gets back to any level of solid footing.

Der Spiegel: NSA developed software for backdoor access to iPhones

The U.S. National Security Agency was developing a software implant in 2008 for Apple iPhones that allowed the agency to take almost total control of the device, including retrieving text messages and voicemail and remotely turning on its microphone and camera, according to a report by Der Spiegel.

Analysis: security weak spots

Reading the coverage of the recent breach of Adobe passwords, we learned that 1.9 million users used “123456” as their password. That’s right: out of 38 million cracked passwords, almost two million adults used ones more suited to five-year-olds.

Cyber-crime will not stop for Christmas

Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.

NSA ‘compromised more than 50,000 networks’ worldwide

The U.S. National Security Agency reportedly hacked into over 50,000 computer networks around the world as part of its global intelligence gathering efforts, and also taps into large fiber optic cables that transport Internet traffic between continents at 20 different major points.

Found: 30 unmanaged servers that shouldn’t be

We just found 30 servers that can’t be accounted for. Thirty Internet-facing servers with no malware protection and patchy histories. I need to take a deep breath and figure out just how bad this is and what we can do to stop this sort of thing from happening again.

Startup offers hefty storage with pay-per-use pricing

The model of buying cloud computing resources is different from that of buying traditional hardware and software. Instead of buying licences and investing in equipment, in a cloud computing model, users pay for the resources they use – no more, no less.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines