Related Content
Roundup of the Latest in Coding News In the coding roundup, read about how a former cyber tsar to President Obama wants developers to plan for security early in development, coders are spending 20 percent of their time waiting, and GitHub is taking advantage of its own platform in order to create a new type of data format. |
||
Chinese Hackers Resume Their Attacks After a temporary pause in operations, China is allegedly hacking the same companies and government agencies that the country was singled out for three months earlier. What’s surprising is that the hackers are using the same software they previously used, albeit with a few minor code adjustments. |
||
Hiring? Uncle Sam May Have the Ideal Candidate for You Pamela Rentz looks at the newly created IT Training and Certification Partnership, which is a public-private partnership that aims to help service men and women leverage their previous military IT expertise in the civilian job market. |
||
Will Mobile App Development Slow Due to New Privacy Laws? A recent extension to the Children's Online Privacy Protection Act has mobile application developers scrambling to not only follow the new laws but also just to understand them—and the penalties that come with them. Some believe the laws can in fact be followed, but more time is needed to comply. |
||
Java 8 Gets 2014 Release Date as Java 7 Patches Continue It's safe to say that Java 7 didn't go quite as smoothly as Oracle wanted since multiple major security flaws have been exposed since its release. Oracle's not taking any chances with the much-anticipated Java 8. They've recently announced a newly delayed March 2014 release date. |
||
ISP Injects Ads into Paying Subscribers’ Web Content Banner ads were showing up along the bottom of popular websites such as Bing, Apple, eBay and Amazon. It turns out the cable operator was allowing an outside company to inject the ads into the pages. What does it mean if webpage requests are vulnerable to code inserted by a third party? |
||
Michelle Obama Hacked! Despite a recent White House executive order designed to beef up cyber security, First Lady Michelle Obama has fallen victim to doxing, a technique for collecting from the Internet personal information that then can be used to access more sensitive, security-critical information. |
||
When It Comes to Installing Updates, Don’t Forget Your Desktop Mobile may be getting all the press these days due to issues raised with third-party app security, but the apps on our desktops and PCs are just as susceptible to viruses and attacks. Protecting your desktop computer is just as simple as protecting your mobile device. You just need to be educated. |