January 24, 2014

Windows malware tries to infect Android devices connected to PCs
The new malware, dubbed Trojan.Droidpak by Symantec, drops a DLL file on the Windows computer and registers a new system service to ensure its persistence across reboots. It then downloads a configuration file from a remote server that contains the location of a malicious APK (Android application package) file called AV-cdk.apk. The Trojan program downloads the malicious APK, as well as the Android Debug Bridge (ADB) command line tool that allows users to execute commands on Android devices connected to a PC.


Management technologies to ensure mobile data security and compliance
There is no shortage of management technologies available to address these situations. The key is choosing the right products and developing the proper policies to enable secure use of consumer technologies in the enterprise without detracting from their many benefits. Organizations often turn to device-focused strategies and legacy technologies, but a new breed of products and a different way of thinking may be required to strike the right balance.


Lack of Stronger Cyber Security May Cost World Economy $3 Trillion
Titled 'Risk and Responsibility in a Hyperconnected World', the report cautioned that there could be increased cyber attacks if there is a failure to strengthen capabilities for deterring such activities.  Major technology trends, including massive analytics, cloud computing and big data, could create between USD 9.6 trillion and USD 21.6 trillion in value for the global economy.


Data Center Infrastructure Management - Where's the Beef?
There's a general lack of acceptance or understanding of what a DCIM tool is supposed to be. Is it asset management, capacity planning, resource management, environmental controls, automation, or all of the above and more? When the customer hears too many voices, they tend to ignore all of them, at least I do. To combat this issue, DCIM vendors will have to get better at highlighting and demonstrating value in a clear and simple way. I know this seems obvious, but I would argue that the majority of Data Center operators aren't listening yet, likely because they haven't "heard" the right message.


Living in Interesting Times—A View from the New Zealand Privacy Office
Leaving space to deal with the unexpected isn’t easy when even the “known knowns” —or should that be “known unknowns”? —occupy us full time. These include the government’s intention to reform the 20-year-old Privacy Act. The exact shape of the changes is still tba, but we’re hoping for announcements reasonably soon. Proposed changes by the Law Commission, if accepted, would include putting a few more items in our enforcement toolbox, to enable us to deal better with modern information practices and to speed up our current investigations processes. Fingers crossed.


5 Big Business Intelligence Trends For 2014
What's in store for business intelligence in 2014? In some respects, 2014 will echo themes heard in 2013, but the message is getting louder when it comes to visual data discovery, cloud, and mobile. Big data also will continue to garner attention, but people will take a pragmatic approach to adoption. Simplicity, meanwhile, will experience a second coming.


Why I did it: Former hacker Mitchell Frost explains his motivation
"In 2006, I was young and, even at that age, I could see there was a lot of corruption and media propaganda going on in newspapers and on television. At that time, I had a rather large and complicated botnet. With the botnet, I was able to use the compromised computers for almost anything; key strokes, DDOS, servers, passwords, pranks. I had several botnets over the years from a few to thousands and didn't do a whole lot of DDOS on servers because I had no need to."


Cool or creepy? The ethics of big data is on the table
Ethics aren't an easy conversation to have in a business setting, Davis said. The topic is huge, messy and, yes, personal, and it tends to get tacked on to a pile of pressing obligations. In other words, it's not a topic that's easily dispatched. But in the absence of legislation that keeps pace with technological advancement, Davis believes it's a conversation that should happen -- especially among those practicing big data analytics.


The Neuroscience of Agile Leadership
The more we try to convince people of something, the more they push back. It’s our brains telling us this doesn’t add up. We sense threat when we feel forced in some way. Employees need to own any kind of change initiative for it to be successful. There is a critical role that neuroscience can play in making successful change. In environments where there is less stress, there is more thinking going on, we can focus our brains to find meaning in our work, and we can learn to see change as part of personal and organizational growth. Neuroscience is adding new insight into how the brain reacts to change.


Real-Time Computer Vision on Android using BoofCV
In this article, a step by step tutorial will be given for writing a simple computer vision application on Android devices using BoofCV. At the end of the tutorial, you will know how to process a video feed, compute the image gradient, visualize the gradient, and display the results. For those of you who don't know, BoofCV is an open source computer vision library written in Java, making it a natural fit for Android devices.



Quote for the day:

"The best strategy for building a competitive organization is to help individuals become more of who they are." -- Marcus Buckingham