The Upload: Your tech news briefing for Friday, April 17

WikiLeaks publishes stolen Sony info...IBM opens up threat data...China suspends rule on foreign IT vendors

Concern is increasing that Anonymous may target critical infrastructure, and while analysts say it is possible, it is probably not likely. Pictured are supporters of Supporters for WikiLeaks founder Julian Assange outside a London court in February 2011.

Concern is increasing that Anonymous may target critical infrastructure, and while analysts say it is possible, it is probably not likely. Pictured are supporters of Supporters for WikiLeaks founder Julian Assange outside a London court in February 2011.

Wikileaks goes to Hollywood

WikiLeaks won plaudits from people who want to see the workings of government exposed to daylight, by publishing a vast trove of U.S. data several years ago. Now, it's decided to expose another cache of purloined information that has decidedly less obvious benefit for the public interest. It's put up a searchable database of the documents stolen from Sony Pictures last year in a high-profile hack, using the rationalization that basically, big companies should have their dirty washing hung out just because (insert reference to military-industrial complex here). Those who can't wait to read a Hollywood executive's true feelings about a certain famous actress would probably agree.

IBM opens up its threat data

IBM has joined the growing crowd pushing for real-time cybersecurity information-sharing: on Thursday, the company opened up over 700 terabytes of data about vulnerabilities, attacks and other threats through a new cloud-based threat intelligence sharing platform called IBM X-Force Exchange. The data includes threat information based on monitoring of more than 15 billion security events per day and malware threat intelligence from a network of 270 million endpoints.

Foreign tech companies catch a break in China

China's government has given foreign tech companies a reprieve: it's suspended onerous new rules for selling into the banking sector, the New York Times reports. Companies had vehemently protested the regulations, which required them to share source code and other intellectual property.

AMD pulls back from high-density server business

High-density servers were expected to be all the rage, but didn't turn out to be a moneymaker for AMD. The company said it is moving away from the effort it launched three years ago with the $334 million acquisition of SeaMicro, which developed a new type of high-density server aimed at large-scale cloud and Internet service providers. AMD still sees growth potential in the server market, but not from selling complete systems. The announcement came amid a slump in revenue and increased losses for the company.

LA schools: We spent $1 billion on this borked Apple project and want our money back

The Los Angeles school district wants to claw back millions from Apple over a failed $1.3 billion project to build out wireless school networks and provide 650,000 students with iPads they could use at home. Apple hired Pearson Education as a subcontractor to develop software for the iPads, but according to a letter the school district sent to Apple this week, a "vast majority" of the students have been unable to use the software. And yeah, we hear you mom: They really did want to spend a billion dollars to give the kids more screen time!

Patch me if you can

This has been a busy week for systems administrators keeping up with the output of security updates to fix critical vulnerabilities. Microsoft issued 11 security bulletins covering 26 vulnerabilities across a wide range of products. Oracle released 98 security fixes spanning many business products and also issued the last free patch for Java version 7, forcing a large number of companies to either re-engineer their apps for Java 8 or sign up for extended support contracts. Finally Adobe released patches for vulnerabilities in its ColdFusion Web application development platform, Flex and Flash Player, the updates for the latter including a fix for a zero-day vulnerability.

Instagram bans more than nudity

Wildly popular among tweens and teens, Instagram seems intent on cleaning up the content shared among members of this most visual of social networks. It had already banned nudity and extreme violence, and now it's making clear it doesn't want to see revenge porn, any sexual content involving minors, posts offering sexual services, buying or selling illegal or prescription drugs, or posts promoting recreational drug use. (Also, no terrorism or hate speech.)

Bloomberg trading network hit by outages

Financial traders around the world were venting their frustrations after the Bloomberg terminals they rely on for market information went offline Friday morning. The company has about 315,000 subscribers who pay about $24,000 annually for its Bloomberg Professional terminals.

Watch now

On World Tech Update this week, the EU targets Google, a manuscript by Alan Turing sells for more than $1 million, and a drone shoots 4K video.

One last thing

Moore's Law, a set of observations made by Intel co-founder Gordon Moore in an article published 50 years ago this Sunday, is the key concept underlying the progression of computers from being as big as a room to fitting into the frames of your glasses. Here's a look at back at the idea that as transistor density doubles, chips shrink in size, processing speeds up, and the cost per processor declines.

Join the CSO newsletter!

Error: Please check your email address.

Tags IBMAdvanced Micro DevicesAdobe Systemswikileakshardware systemsSony PicturesinternetOracleBloombergAppleInstagramMicrosoftsecurity

More about AMDAppleBloombergEUGoogleIntelMicrosoftOraclePearsonPearson EducationSonyX-Force

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by IDG News Service staff

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place