Search This Blog

Tuesday, December 11, 2007

Trusted users pose significant security threats; Top 6 Cisco acquisitions; Record spam flood

Daily News PM Alert Network World logo
NetworkWorld.com | LANs & WANs Research Center | Update Your Profile
Trusted users pose significant security threats, survey finds

Denise Dubie By Denise Dubie
Innocent insiders pose a threat to network security by not following preset policies and putting corporate data at risk of exposure. Read full story

Senior Editor Denise Dubie covers the technologies, products and services that address network, systems, application and IT service management for Network World. E-mail Denise.


SPONSORED BY AEROHIVE NETWORKS INC.
rule

The Next Cutting-Edge WLAN Architecture
Discover how a cooperative-control WLAN architecture delivers more scalability, capacity and availability than any other enterprise-class WLAN - while eliminating the need for dedicated WLAN controllers that increase costs and complexity.

rule
RELATED NEWS:

Top 6 Cisco acquisitions of 2007; what it should buy in 2008
Cisco made 11 acquisitions this year culminating in 126 purchases since Cisco's birth. It made three more acquisitions than it did last year, when it spent a measly $256 million buying ho-hum technologies. This year was different, not only in the sheer dollar size of some acquisitions, but also because of the breadth of technologies it acquired.

Spam flood hit '07 high in November, says Symantec
Spam surged to 72% of overall e-mail traffic monitored by Symantec in November, the highest percentage for any month this year, according to Symantec’s monthly “State of Spam Report.”

DNS attack could signal Phishing 2.0
Researchers at Google and the Georgia Institute of Technology are studying a virtually undetectable form of attack that quietly controls where victims go on the Internet.

Cisco demos ways to expand TelePresence
Cisco is expanding the reach of its TelePresence technology by demonstrating how carriers can support secure business-to-business conferences and separately by showing Cisco support for lower quality, traditional videoconferencing gear in its high- ...

Private customer data vulnerable during application testing
Sixty-two percent of companies surveyed by the Ponemon Institute report that during the application development and testing process, they use real customer data-including employee, vendor and customer records, and credit card and Social Security numbers-instead of disguised data to test applications.

Two wireless LANs better than one, Carnegie Mellon says
Instead of one WLAN vendor, Carnegie Mellon University chose two for its campus-wide 802.11n wireless network.

MSN puts ads on mobile phones
Microsoft began displaying advertisements to mobile users of its MSN site in the U.S. on Monday.

New tool finds race conditions in multithreaded apps
Coverity, a company that specializes in detecting coding flaws in software, has added a new feature to one of its products that finds ...

Fancy dress cops rob London data center
A data center in central London, reportedly belonging to Verizon Business, has been robbed by thieves dressed as policemen.

Oops! Skype forgets to tell users of bug or patch job
Skype Monday blamed an "unintentional communication oversight" for not notifying users a month ago that it had patched the Windows version of its VoIP client software against a critical bug.


HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

'07 ENTERPRISE ALL-STARS
'07 ENTERPRISE ALL-STARS Honoring outstanding technology projects.

SPONSORED BY AEROHIVE NETWORKS INC.
rule

The Next Cutting-Edge WLAN Architecture
Discover how a cooperative-control WLAN architecture delivers more scalability, capacity and availability than any other enterprise-class WLAN - while eliminating the need for dedicated WLAN controllers that increase costs and complexity.

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/11/07

TODAY'S MOST-READ STORIES:

  1. Microsoft pulls plug on potty-mouth Santa
  2. Scary tech stories
  3. Open source software targets math programs
  4. AT&T expands reach of 40G backbone
  5. Former Microsoft employee charged
  6. The nine worst Microsoft products
  7. 2007 Cool Yule Tools gift guide
  8. Net coding: networking's next revolution?
  9. Cyberattack on national labs
  10. Review: Who's got the fastest firewall?


TOP 100 OF 2007


Comprehensive Network Access Control

Download an exclusive whitepaper on Comprehensive Network Access Control and discover how you can provide endpoint security, compliance and peace of mind. Get it now



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Daily News PM Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: