The Upload: Your tech news briefing for Wednesday, April 8

Microsoft to show next Office apps... Intel shrinks RealSense 3D camera for phones... US drug agency started bulk records collection in 1992

Using Alt-TAB to cycle through windows isn’t that different than Windows 8, but you can see more of what each window holds.

Using Alt-TAB to cycle through windows isn’t that different than Windows 8, but you can see more of what each window holds.

Microsoft will offer a peek at new Office apps next week

A Microsoft event on April 16 promises an advance look at how the next version of Office will work with Windows 10, PC World reports. Demonstrations are expected to include applications that run across all platforms from mobile to desktop, and some new features in Office 2016, optimized for a touch interface.

Intel shrinking RealSense 3D camera

Intel has shrunk its RealSense 3D camera and is in China pitching it to smartphone makers. In Shenzhen on Wednesday, CEO Brian Krzanich showed off a 6-inch prototype phone built with the new camera, which will be available in devices later this year.

US drug agency collected bulk phone records way before the NSA

Bulk collection of U.S. citizens' phone records by the U.S. Drug Enforcement Agency started earlier and may have amassed more data than a similarly reviled program carried out by the National Security Agency, a report Tuesday by USA Today suggests. The secret program started in 1992 and collected information on virtually all international calls made by Americans to about 116 countries. Some operators were hesitant to supply the data, but none went to court to contest the blanket subpoenas.

SingTel eyes managed security with TrustWave buy

Singaporean communications provider SingTel is paying US$810 million to acquire TrustWave Holdings, the largest U.S. independent provider of managed security services. TrustWave will continue as a separate business unit in Chicago, focused on addressing the managed security services market that Gartner expects will grow to $24 billion in the next three years from $14 billion last year.

Russians crack the White House

Hackers working for the Russian government got access to sensitive parts of White House computer systems, CNN reported. Investigators believe they gained access via compromised systems at the State Department, which has spent months trying to purge its email servers of lurkers. The hackers apparently had access to sensitive information such as real-time, non-public details of the president's schedule.

GreatFire says DDoS attack won't deter its fight against Chinese Net censorship

GreatFire said it won't stop its efforts to circumvent Internet censorship in China despite a recent DDoS attack that threatened to cripple its activities, and that it believes came from the country's government. GreatFire offers Chinese users ways to bypass China's censorship of sites such as Google, the BBC and The New York Times, by offering mirror websites to those blocked destinations.

Apple wants to put an end to launch day queues at stores

Maybe a long line of noisy fans standing outside the shop is an out-of-date image for a company that's increasingly positioning itself as technology's luxury brand. Or maybe Apple fears sending too many customers away empty-handed if, as expected, demand for its new Watch outstrips supply. In either case, it's sent a memo to retail employees asking them to steer customers online to order either the new wearable or the latest MacBook.

Watch now

Drones herding sheep? Take a look at how some farmers are saving on dog food.

One last thing

If you're tempted by the promises of in-home connected devices, check out this in-depth look at security concerns you should keep in mind.

Join the CSO newsletter!

Error: Please check your email address.

Tags GreatFireAppletrustwaveMicrosoftsecurityComponentssoftwaresingtelintel

More about AppleCNNGartnerGoogleIntelMicrosoftNational Security AgencyNSA

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by IDG News Service staff

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place