Friday, August 31, 2018

Hacker Who Leaked Celebrities' Naked Photos Gets 8 Months in Prison

The Hacker News Daily Updates
Newsletter
cover

Cloud Comparison - Microsoft Azure vs. Amazon Web Services

Is your enterprise considering moving to cloud-based Infrastructure as a Service?

Download Now Sponsored
LATEST NEWS Aug 31, 2018

Hacker Who Leaked Celebrities' Naked Photos Gets 8 Months in Prison

George Garofano (left) The fourth celebrity hacker—who was charged earlier this year with hacking into over 250 Apple iCloud accounts belonged to Jennifer Lawrence and other Hollywood celebrities—has been sentenced to eight months in prison. Earlier this year, George Garofano, 26, of North ...

Read More
Twitter Facebook LinkedIn

Google 'Titan Security Key' Is Now On Sale For $50

Google just made its Titan Security Key available on its store for $50. First announced last month at Google Cloud Next '18 convention, Titan Security Key is a tiny USB device—similar to Yubico's YubiKey—that offers hardware-based two-factor authentication (2FA) for online accounts with the ...

Read More
Twitter Facebook LinkedIn

Air Canada Suffers Data Breach — 20,000 Mobile App Users Affected

Air Canada has confirmed a data breach that may have affected about 20,000 customers of its 1.7 million mobile app users. The company said it had "detected unusual log-in behavior" on its mobile app between August 22 and 24, during which the personal information for some of its customers "may ...

Read More
Twitter Facebook LinkedIn

Instagram Adds 3 New Security Tools to Make its Platform More Secure

Instagram is growing quickly—and with the second most popular social media network in the world (behind just Facebook), the photo-sharing network absolutely dominates when it comes to user interactions. And with great success comes great responsibility—responsibility to keep users' accounts safe, ...

Read More
Twitter Facebook LinkedIn

Hacker Discloses Unpatched Windows Zero-Day Vulnerability (With PoC)

A security researcher has publicly disclosed the details of a previously unknown zero-day vulnerability in the Microsoft's Windows operating system that could help a local user or malicious program obtain system privileges on the targeted machine. And guess what? The zero-day flaw has been ...

Read More
Twitter Facebook LinkedIn
cover

Cloud Comparison - Microsoft Azure vs. Amazon Web Services

Is your enterprise considering moving to cloud-based Infrastructure as a Service?

Download Now Sponsored

This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Thursday, August 30, 2018

How to Unscramble a Rat’s Nest of Code

How Mid-Size Firms Tackle DevOps, Straight Talk for Data Scientists, Experian DataLab's Analytics R&D Shop, and more.

InformationWeek Today
August 30, 2018
bar
Get to a State of Continuous Integration and Development
It's time to get control of your application development processes and stop the code creep with DevOps.

Continue Reading

 

TOP STORIES


How Mid-Size Firms Can Overcome DevOps Challenges

Wedged between resource-rich global giants and nimble small firms, many mid-size enterprises struggle to achieve DevOps success. Here are the best ways of addressing this problem.
Read More

Stop Talking Gobbledygook to the Business

For all of the promise that AI and machine learning have for an enterprise, you won't realize the technology's potential if data scientists blather in data science speak.
Read More

Experian DataLabs Pioneers Internal Analytics R&D

Experian DataLabs eight years ago pioneered the idea of an analytics and AI R&D shop inside a bigger company. Here's how it started at that credit reporting and scoring giant and what it is doing now.
Read More

ITIL, DevOps, Whatever - The Labels Don't Matter

If you think you're enlightened because you're now a DevOps shop (or have always been), there's news for: Whether you're ITIL or DevOps, Agile or Lean, what you call your team won't protect you from failure.
Read More

TECH RESOURCES


WHITE PAPERS


ONLINE EVENTS
Email's Original Sin and How Automated Authentication is Changing it
Learn how email's "original sin" - its inherent lack of authentication - is being addressed with ide...
Learn More


PARTNER PERSPECTIVES
The Unstoppable Progression of Object Storage
New developments in gateways, plugins, and more, offer far more value to users of object storage tha...
Read More

 
Hottest Places to Find a Tech Job
5 Machine Learning Technologies You Should Know
There's more to machine learning and AI than languages. Here's a look at five important libraries and frameworks. Read More
(Sponsored Article) How APIs Help Keep It Simple for Developers
The expectation of simple experiences along with the preference of mobile devices is changing what consumers and businesses expect and need. From banking to healthcare to retail and beyond, organizations of all sizes are using APIs to innovate and adapt quickly. Read More
Hottest Places to Find a Tech Job
10 Ways Technology Is Reshaping Retail
Your future shopping experiences might be much more automated, but they also might be much more personal than today's trips to the store. Read More
The Next Generation of IT Support
The workforce is changing as businesses become global and technology erodes geographical and physical barriers.IT organizations are critical to enabling this transition and can utilize next-generation tools and strategies to provide world-class support regardless of location, platform or device Read More
InformationWeek c/o UBM
303 Second St., Suite 900 South Tower
San Francisco, CA 94107

Contact Us | Privacy Policy | Unsubscribe
© UBM 2017. All Rights Reserved.
 

Air Canada Suffers Data Breach - 20,000 Mobile App Users Affected

The Hacker News Daily Updates
Newsletter
cover

Cyber Security - Actionable Ways to Protect Your Data and IT Systems

If you’re a business leader, you’ve heard, read or thought about it more than you probably want to: the ceaseless war to protect your company’s network and data from a hacker.

Download Now Sponsored
LATEST NEWS Aug 30, 2018

Air Canada Suffers Data Breach — 20,000 Mobile App Users Affected

Air Canada has confirmed a data breach that may have affected about 20,000 customers of its 1.7 million mobile app users. The company said it had "detected unusual log-in behavior" on its mobile app between August 22 and 24, during which the personal information for some of its customers "may ...

Read More
Twitter Facebook LinkedIn

Instagram Adds 3 New Security Tools to Make its Platform More Secure

Instagram is growing quickly—and with the second most popular social media network in the world (behind just Facebook), the photo-sharing network absolutely dominates when it comes to user interactions. And with great success comes great responsibility—responsibility to keep users' accounts safe, ...

Read More
Twitter Facebook LinkedIn

Hacker Discloses Unpatched Windows Zero-Day Vulnerability (With PoC)

A security researcher has publicly disclosed the details of a previously unknown zero-day vulnerability in the Microsoft's Windows operating system that could help a local user or malicious program obtain system privileges on the targeted machine. And guess what? The zero-day flaw has been ...

Read More
Twitter Facebook LinkedIn

Critical Flaw in Fortnite Android App Lets Hackers Install Malware

Security researchers from Google have publicly disclosed an extremely serious security flaw in the first Fortnite installer for Android that could allow other apps installed on the targeted devices to manipulate installation process and load malware, instead of the Fortnite APK. Earlier this ...

Read More
Twitter Facebook LinkedIn

T-Mobile Hacked — 2 Million Customers' Personal Data Stolen

T-Mobile today confirmed that the telecom giant suffered a security breach on its US servers on August 20 that may have resulted in the leak of "some" personal information of up to 2 million T-Mobile customers. The leaked information includes customers' name, billing zip code, phone number, email ...

Read More
Twitter Facebook LinkedIn
cover

Cyber Security - Actionable Ways to Protect Your Data and IT Systems

If you’re a business leader, you’ve heard, read or thought about it more than you probably want to: the ceaseless war to protect your company’s network and data from a hacker.

Download Now Sponsored

This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India