Wednesday, June 20, 2012

Windows Phone joins the Windows 8 and corporate parties

Smartphone security is heading for 'apocalypse' | Hacker group demands 'idiot tax' from payday lender

Today's InfoWorld Headlines: Wrap Up

Forward this to a Friend >>>


Windows Phone joins the Windows 8 and corporate parties
A major change in Microsoft's smartphone platform provides core OS, graphics, and Web features across smartphones, tablets, and PCs. Read More


WHITE PAPER: Box

The ROI of Cloud Apps
Cloud apps continue to gain momentum in the enterprise as buyers are attracted to fast deployment speeds, low upfront costs, and ongoing flexibility to scale up or down as needs change. This report analyzes the five-year ROI for cloud apps across CRM, ERP, collaboration, and IT service management. Read Now!

WHITE PAPER: Oracle

Proven Value with the Oracle Database Appliance
This executive brief highlights the data management challenges a California-based organization faced and illustrates how their chosen solution resulted in cost savings and in better overall use of IT resources - and exceeded all expectations. Learn More!

Smartphone security is heading for 'apocalypse'
The meteoric rise in the smartphone market is creating a dangerous vulnerability in smartphone security - one that may not be patched until the problem expands into what has been dubbed an "apocalypse." Read More

Hacker group demands 'idiot tax' from payday lender
Hacker group Rex Mundi has made good on its promise to publish thousands of loan-applicant records it swiped from AmeriCash Advance after the payday lender refused to fork over between $15,000 and $20,000 as an extortion fee. Read More


WHITE PAPER: Box

Empowering Your Mobile Worker
Today's most productive employees are mobile, and your company's IT strategy must be ready to support them with 24/7 access to the business information they need across a range of mobile devices. See how corporations are meeting the many needs of their mobile workers with the help of Box. Read Now!

Google Apps admins can now enforce use of two-step log-in process
Two-step verification, which adds a second layer of security to a log-in process, has been available since 2010 in Google Apps, but now IT administrators will be able to enforce it for all their users as a requirement. Read More

Virtual analysis misses a third of malware
Security vendors sell virtualized appliances to run and analyze the behavior of suspicious applications to identify malware. Over the last few years, cyber criminals have found ways to make their malware appear benign. Read More




Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_todays_headlines_wrap_up as foeprotais.news@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2011 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **


1 comment:

  1. Want To Boost Your ClickBank Banner Traffic And Commissions?

    Bannerizer makes it easy for you to promote ClickBank products with banners, simply go to Bannerizer, and get the banner codes for your chosen ClickBank products or use the Universal ClickBank Banner Rotator Tool to promote all of the available ClickBank products.

    ReplyDelete