Apple believes it can patch the iOS security exploit used by the FBI

After a multi-week battle that saw Apple and the FBI duke it out both in court and in the court of public opinion, the FBI finally managed to access a locked iPhone used by one of the San Bernardino shooters. Ultimately, the FBI reportedly relied upon an exploit from an Israeli software forensics company called Cellebrite to bypass the iPhone's built-in security mechanisms.While one might reasonably assume that this spells the end for what proved to be a contentious issue, that couldn't be farther from the truth. For starters, the DOJ has indicated that it won't think twice about seeking help from device manufacturers in future cases.A DOJ statement on the matter reads:To read this article in full or to leave a comment, please click here

Apple believes it can patch the iOS security exploit used by the FBI

After a multi-week battle that saw Apple and the FBI duke it out both in court and in the court of public opinion, the FBI finally managed to access a locked iPhone used by one of the San Bernardino shooters. Ultimately, the FBI reportedly relied upon an exploit from an Israeli software forensics company called Cellebrite to bypass the iPhone's built-in security mechanisms.While one might reasonably assume that this spells the end for what proved to be a contentious issue, that couldn't be farther from the truth. For starters, the DOJ has indicated that it won't think twice about seeking help from device manufacturers in future cases.A DOJ statement on the matter reads:To read this article in full or to leave a comment, please click here

Want a meteorite? Christie’s set to auction unique space rocks

It’s not everyday you could have the opportunity to buy a piece of space – but Christie’s London auction house will on April 20 offer about 80 meteorite pieces and a bunch of space rock paraphernalia to go along with them.+More on Network World: 13 awesome and scary things in near Earth space+The meteorite collection is made up of a variety of sample space rocks from private and public collections with some items expected to fetch over a million dollars at the auction.To read this article in full or to leave a comment, please click here

Want a meteorite? Christie’s set to auction unique space rocks

It’s not everyday you could have the opportunity to buy a piece of space – but Christie’s London auction house will on April 20 offer about 80 meteorite pieces and a bunch of space rock paraphernalia to go along with them.+More on Network World: 13 awesome and scary things in near Earth space+The meteorite collection is made up of a variety of sample space rocks from private and public collections with some items expected to fetch over a million dollars at the auction.To read this article in full or to leave a comment, please click here

Meg Whitman: Here’s everything you need to know about HP Enterprise

Meg Whitman doesn't shy away from a challenge. She led eBay from tiny startup to household name, ran for governor of California and, nearly five years ago, took the helm at Hewlett Packard and stabilized an organization stumbling badly from a variety of very public missteps. Having engineered the split of the Silicon Valley icon into consumer tech (HP, Inc.) and corporate-focused Hewlett Packard Enterprise, Whitman is now HPE's Chief Executive Officer. The IT market is undergoing fundamental and rapid change owing to cloud, mobile and other powerful drivers. The competitive landscape in which this $50 billion startup plays is also shifting dramatically, with a slew of emerging players and the prospect of the largest-ever tech merger of Dell and EMC. No sweat, right? To read this article in full or to leave a comment, please click here

Meg Whitman: Here’s everything you need to know about HP Enterprise

Meg Whitman doesn't shy away from a challenge. She led eBay from tiny startup to household name, ran for governor of California and, nearly five years ago, took the helm at Hewlett Packard and stabilized an organization stumbling badly from a variety of very public missteps. Having engineered the split of the Silicon Valley icon into consumer tech (HP, Inc.) and corporate-focused Hewlett Packard Enterprise, Whitman is now HPE's Chief Executive Officer. The IT market is undergoing fundamental and rapid change owing to cloud, mobile and other powerful drivers. The competitive landscape in which this $50 billion startup plays is also shifting dramatically, with a slew of emerging players and the prospect of the largest-ever tech merger of Dell and EMC. No sweat, right? To read this article in full or to leave a comment, please click here

Report: CIOs neglect BPM in favor of trendier software

Business process management (BPM) systems are essential to creating an efficient organization, but many CIOs today are more focused on trendier topics such as data analytics and CRM, according a report by Technology Evaluation Centers (TEC).To read this article in full or to leave a comment, please click here(Insider Story)

New Azure tool helps IT tame SaaS apps

More organizations are moving their data out of their data centers and into the cloud, which complicates IT’s efforts to keep track of applications in use. With the new Microsoft Cloud App Security within Microsoft Azure, IT and security teams can step up application discovery and apply controls in line with existing security, privacy, and compliance policies.Most enterprises rely on cloud applications, whether or not they are officially sanctioned. Shadow IT is pervasive, with employees signing up for SaaS applications on their own without first going through IT. According to Microsoft’s statistics, an employee uses 17 cloud applications on average, and an organization shares 13 percent of its files externally, of which a quarter are shared publicly. Business units do what they must to get the job done, but IT is left in the dark about what applications employees use and where corporate data is stored.To read this article in full or to leave a comment, please click here

New Azure tool helps IT tame SaaS apps

More organizations are moving their data out of their data centers and into the cloud, which complicates IT’s efforts to keep track of applications in use. With the new Microsoft Cloud App Security within Microsoft Azure, IT and security teams can step up application discovery and apply controls in line with existing security, privacy, and compliance policies.Most enterprises rely on cloud applications, whether or not they are officially sanctioned. Shadow IT is pervasive, with employees signing up for SaaS applications on their own without first going through IT. According to Microsoft’s statistics, an employee uses 17 cloud applications on average, and an organization shares 13 percent of its files externally, of which a quarter are shared publicly. Business units do what they must to get the job done, but IT is left in the dark about what applications employees use and where corporate data is stored.To read this article in full or to leave a comment, please click here

Microsoft to release a Surface Phone in 2017

There have been rumors floating among Microsoft enthusiast sites that the company plans to replace its Lumia brand with a Surface branded phone, bringing it at least into name parity with the more successful tablet line.Now Windows Central, which has a decent track record on mobile news, saysthat there will be a Surface Phone line, but not until next year. In the meantime, there would be a marginal effort with the Lumia, a $7.7 billion mistake that can be blamed on the prior CEO. WC theorizes this is to continue Windows 10 Mobile development, give OEM partners time to make new hardware and give Microsoft time to come back with a bang.To read this article in full or to leave a comment, please click here

Hacking Team lost its license to sell surveillance malware outside Europe

Oh man, what a shame, Italy’s Hacking Team had its global export license revoked and now it can’t sell its spyware outside of Europe without getting special approval.It’s not even been a year since the Hacking Team became the Hacked Team, but after being pwned the company apparently didn’t crawl off and die. The Hacking Team’s newest woes, which were first reported by the Italian newspaper Il Fatto Quotidiano, means the company can’t easily conduct business as usual by selling its Remote Control Software to just anyone who wants it.To read this article in full or to leave a comment, please click here

Hacking Team lost its license to sell surveillance malware outside Europe

Oh man, what a shame, Italy’s Hacking Team had its global export license revoked and now it can’t sell its spyware outside of Europe without getting special approval.It’s not even been a year since the Hacking Team became the Hacked Team, but after being pwned the company apparently didn’t crawl off and die. The Hacking Team’s newest woes, which were first reported by the Italian newspaper Il Fatto Quotidiano, means the company can’t easily conduct business as usual by selling its Remote Control Software to just anyone who wants it.To read this article in full or to leave a comment, please click here

69% off Photive Wireless Secure Fit Earbuds – Deal Alert

Photive's PH-BTE70 Wireless Bluetooth Earbuds are designed to be sweatproof, and to stay in your ears while you're busy being active. It currently averages 4 out of 5 stars from over 1,180 people on Amazon (see reviews). The PH-BTE70 has a 33ft extended wireless range and delivers up to 6 hours of music on a single charge. Reviewers indicate that they are comfortable, stylish, and deliver very good sound quality for the price -- which right now is discounted 69%.To read this article in full or to leave a comment, please click here

Microsoft brings Bash to Windows with new beta build

One of the major announcements from Microsoft's Build developer conference last week was that the company was bringing the popular Bash command line interface to Windows 10 with a new Linux subsystem. Now, developers can give it a shot with a new beta build of the operating system, which Microsoft released Wednesday morning.People on the Windows Insider Program's fast ring will get access to the build, which includes a wide variety of other new features, too. Foremost among them are a set of new Cortana features that link their Windows or Android phones with users' PCs in a variety of ways.To read this article in full or to leave a comment, please click here

FIRST LOOK: Vivaldi 1.0, the new web browser for the old school

Vivaldi springs forthWhile the trend in modern browsers is to provide as streamlined an experience as possible, with simplicity and ease of use as the guiding principles, there are plenty of users who want powerful, rich feature sets, instead. The team behind Vivaldi, including Opera browser co-creator Jon von Tetzchner, is hoping that their new browser’s blend of throwback functionality and modern tech will catch on. You can download Vivaldi here on Macs, Windows or Linux, but first check out the highlights in our slideshow.To read this article in full or to leave a comment, please click here

Massive application-layer attacks could defeat hybrid DDoS protection

Security researchers have recently observed a large application-layer distributed denial-of-service attack using a new technique that could foil DDoS defenses and be a sign of things to come for Web application operators.The attack, which targeted a Chinese lottery website that used DDoS protection services from Imperva, peaked at 8.7Gbps. In a time when DDoS attacks frequently pass the 100Gbps mark, 8.7Gbps might not seem much, but it's actually unprecedented for application-layer attacks.DDoS attacks target either the network layer or the application layer. With network-layer attacks, the goal is to send malicious packets over different network protocols in order to consume all of the target's available bandwidth, essentially clogging its Internet pipes.To read this article in full or to leave a comment, please click here

Massive application-layer attacks could defeat hybrid DDoS protection

Security researchers have recently observed a large application-layer distributed denial-of-service attack using a new technique that could foil DDoS defenses and be a sign of things to come for Web application operators.The attack, which targeted a Chinese lottery website that used DDoS protection services from Imperva, peaked at 8.7Gbps. In a time when DDoS attacks frequently pass the 100Gbps mark, 8.7Gbps might not seem much, but it's actually unprecedented for application-layer attacks.DDoS attacks target either the network layer or the application layer. With network-layer attacks, the goal is to send malicious packets over different network protocols in order to consume all of the target's available bandwidth, essentially clogging its Internet pipes.To read this article in full or to leave a comment, please click here

Massive application-layer attacks could defeat hybrid DDoS protection

Security researchers have recently observed a large application-layer distributed denial-of-service attack using a new technique that could foil DDoS defenses and be a sign of things to come for Web application operators.The attack, which targeted a Chinese lottery website that used DDoS protection services from Imperva, peaked at 8.7Gbps. In a time when DDoS attacks frequently pass the 100Gbps mark, 8.7Gbps might not seem much, but it's actually unprecedented for application-layer attacks.DDoS attacks target either the network layer or the application layer. With network-layer attacks, the goal is to send malicious packets over different network protocols in order to consume all of the target's available bandwidth, essentially clogging its Internet pipes.To read this article in full or to leave a comment, please click here