control security

control security

Ice IX banking Trojan steals info that enables fraudsters to hijack phone calls

www.computerworld.com
New variants of the Ice IX online banking Trojan program are tricking victims into exposing their telephone numbers so that fraudsters can divert post-transaction verification phone calls made by banks to phone numbers under their control, security researchers said....
Ice IX banking Trojan steals info that enables fraudsters to hijack phone calls

Google Chairman Eric Schmidt's book 'The New Digital Age', available for pre-order shipping April 23

9to5google.com
Eric Schmidt and Google Ideas’ Jared Cohen (author of Children of Jihad) have penned a book about how technology will profoundly affect the lives of everyone in the coming years. It gets some pretty impressive reviews from some pretty impressive people, below. You can pre-order it for shipping now April...
Google Chairman Eric Schmidt's book 'The New Digital Age', available for pre-order shipping April 23

European crowdfunding leaders call for EU support

thenextweb.com
A new paper, published today and supported by names from across Europe’s crowdfunding scene, calls on the European Union to provide more support to this burgeoning movement. A Framework for European Crowdfunding lays out a plan for how new regulation, education programs and research could strengthen crowdfunding’s place in the EU...
European crowdfunding leaders call for EU support

Evernote to Offer Its Idea- and Note-capture Tool for Businesses, CEO Says

www.pcworld.com
Evernote will launch a business program in the coming months, allowing administrators to better control security and data, company CEO Phil Libin said on Friday......
Evernote to Offer Its Idea- and Note-capture Tool for Businesses, CEO Says

In cyberattacks, hacking humans is highly effective way to access systems

www.washingtonpost.com
The e-mails arrived like poison darts from cyberspace. Some went to the Chertoff Group, a national security consulting firm in Washington. Others targeted intelligence contractors, gas pipeline executives and industrial-control security specialists. Each note came with the personal touches of a friend or colleague. Read full article >>...
In cyberattacks, hacking humans is highly effective way to access systems
Tenable wields $50M sword in battle against cyber crime

Here's How Groupon Set Up A New Age Company (GRPN)

www.businessinsider.com
Groupon grew up super fast thanks in large part to cloud computing. It famously started on Amazon's cloud, not buying much of its own tech until recently. Things are changing now. As Groupon grows, it is moving off of Amazon and into its own data centers, which are being built...
Here's How Groupon Set Up A New Age Company (GRPN)

Google Just Got An Ally In Its Cloud War With Amazon (AMZN, GOOG)

www.businessinsider.com
Google's Compute Engine, a cloud-computing service, just scored a significant new deal. It signed up its first reseller, a company called RightScale, reports GigaOM's Barb Darrow, who broke the news. RightScale offers what it calls a "cloud management platform." It helps an enterprise automate routine tasks, monitor usage and monthly...
Google Just Got An Ally In Its Cloud War With Amazon (AMZN, GOOG)
× Just a test of the new info bar. What do you think?