Rogue Firefox add-ons bring security risks Antonopoulos: Security is as much about choices as it is about policies. Which software solution you pick is as important as how you configure and use it. 17 high-risk security threats (and how to fix them) To use a computer safely in the 21st century, you have to be prepared to combat a growing number of constantly evolving security threats. Where IT pros do their social networking Where do IT pros do their social networking? That's what Network World wanted to find out when it conducted an online survey of 583 readers in January. We discovered that usage is way up compared to last year. Motorola's 'leak' - Windows Mobile 7 due in 2010 Cox: Motorola Co-CEO Sanjay Jha, during the the company's dismal earnings phone conference on Tuesday, let slip that Windows Mobile 7, a major upgrade to Microsoft's mobile operating system, will appear in phones starting in 2010. Norton Utilities brand revived for Windows XP, Vista Symantec Tuesday announced it has revived the Norton Utilities optimization and cleanup tools for Windows that it folded years ago into a broader package after acquiring... Kace embeds patching capabilities in systems management appliance Kace extends patching capabilities via Lumension partnership on its KBOX Systems Management Appliance. Federal workers notified after SRA virus breach Employees at federal security agencies are being notified that their personal information may have been compromised after hackers planted a virus on computer networks of... Significant Opportunities For ROI at ITEXPO Nickasch: The session halls and exhibit floor offered standing room only during opening day at IT Expo East 2009, in Miami Beach, FL. With many innovative products, solutions, and services being discussed and displayed, it is clear that all forms of IP telephony and convergence communications are alive and well. FBI: Online employment scams rising The FBI's Internet Crime Complaint Center warned that anyone looking for a job online needs to be particularly vigilant against growing work-at-home scams. The IC3 said it continues to receive numerous complaints from individuals who have fallen victim to the scammers. Often hired to "process payments," "transfer funds" or "reship products" scammers involve the victims receiving and cashing fraudulent checks, transferring illegally obtained funds for the criminals, or receiving stolen merchandise and shipping it to the criminals, the IC3 stated. Google, NASA, X Prize team to form 'humanity’s grand challenges' university How do you get the world’s best and brightest to focus on solving problems with everything from networks and computing systems; biotechnology and bioinformatics; nanotechnology; medicine, neuroscience; AI, robotics, and cognitive computing; energy and ecological systems; space and physical sciences; policy, law and ethics; and finance and entrepreneurship? You give them a major university where they can study how to change the world. Sound grandiose? It may be, but with NASA, Google, the X Prize Foundation and a broad host of leading experts in a variety of fields backing the school, it may work. February giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here. |
No comments:
Post a Comment