February 19, 2013
CONNECT WITH SMARTBRIEF LinkedInFacebookTwitterGoogle+
SmartBrief on ExecTech
SIGN UP|FORWARD|ARCHIVE|ADVERTISE

The Game Changer
PLA unit is the source of massive Chinese hacking effort, report says
A U.S. computer security firm says it has identified the unit of the Chinese People's Liberation Army responsible for dozens of cyberattacks on U.S. companies over the years. In a 60-page report to be released today, Mandiant says it has overwhelming forensic evidence that attacks on U.S. firms such as Coca-Cola and, more recently, critical infrastructure industries, originated from the nondescript headquarters of PLA Unit 61398. The Chinese government denies responsibility for the attacks, but U.S. intelligence officials have said they have compiled evidence supporting Mandiant's findings. The New York Times (tiered subscription model) (2/18)
Share:LinkedInTwitterFacebookGoogle+Email
Emerging Tools
China captures lead in global device race
Chinese consumers will own 246 million mobile devices by the end of the month, officially overtaking the U.S. as the world's leading market for emerging devices, data show. "China has over 1.3 billion people while the U.S. has just over 310 million. Considering that the U.S. has the world's third-largest population, the only other country that could feasibly overtake China sometime in the future is India, with a population of just over 1.2 billion," said Peter Farago, vice president of marketing at Flurry, which released the tally. CNET (2/18)
Share:LinkedInTwitterFacebookGoogle+Email
Security Update
Vodafone teams up with BAE Systems to boost mobile security
BAE Systems Detica and Vodafone will begin partnering on a cloud-based security system designed to protect mobile devices from intrusion, the companies announced. The system work by scanning inbound and outbound traffic, without affecting device performance, the firms say. Vodafone Mobile Threat Manager is the result of a five-year strategic agreement between the companies and will be deployed to 1,500 enterprise customers. Information-Age.com (2/18)
Share:LinkedInTwitterFacebookGoogle+Email
Tech Business
FCC: Broadband providers meet capacity promises
U.S. consumers can rely on the broadband speeds their service providers say they offer, according to a report from the Federal Communications Commission. The FCC survey found that broadband providers, on average, delivered speeds that were 97% of what was promised, compared with 87% in a 2011 report. CIO.com/IDG News Service (2/15)
Share:LinkedInTwitterFacebookGoogle+Email
Managing IT
Tips for the next-generation CIO
The chief information officer of tomorrow needs to be equal parts tech operative and business strategist; but tech leaders who have made the leap say the transition doesn't come without its challenges, and it requires less focus on how solutions work and more on why. The first step involves letting go of an impulse to micromanage daily operations and concentrate on the big picture, says CIO Tony Summers of East Sussex County Council. IT PRO (London) (2/12)
Share:LinkedInTwitterFacebookGoogle+Email
Don Quixote would have made a lousy innovator
Innovators hate the risk-averse culture of the modern workplace -- but taking a quixotic stand against corporate conservatism won't get you anywhere, writes Gijs van Wulfen. It's better to accept such resistance as a given and work around it, Van Wulfen writes. "Managing innovation has everything to do with managing expectations and reducing risks," he argues. InnovationManagement.se (Sweden) (2/14)
Share:LinkedInTwitterFacebookGoogle+Email
Geeking Out
Researchers turn to gene mapping to unlock secrets of malware
Computer scientists in New Zealand have developed a way to predict the threat level of strains of malware by leveraging the power of DNA mapping. The researchers -- who are from the School of Computing & Mathematical Sciences at Auckland University of Technology -- learned to circumvent limitations of data mining strings of malware code by representing them as amino acid and relying on established protein-modeling techniques to complete the analysis. V3.co.uk (U.K.)/The Frontline blog (2/18)
Share:LinkedInTwitterFacebookGoogle+Email
SmartQuote
Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood."
-- Kevin Mandia, the founder and chief executive of security firm Mandiant, as quoted by The New York Times
Share:LinkedInTwitterFacebookGoogle+Email
Subscriber Tools
Please contact one of our specialists for advertising opportunities, editorial inquiries, job placements, or any other questions.
 
Lead Editor:  Jesse Stanchak
Contributing Editor:  Chris Moraff
Account Director:  Roger Leek
  M: 804.803.1414
 
 

Download the SmartBrief App  iTunes / Android
iTunes  Android
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2013 SmartBrief, Inc.®
Privacy policy |  Legal Information