Wednesday, March 18, 2009

Rootkit code to exploit Intel chips to be posted; What IBM/Sun could mean for cloud computing

Mobile Firefox aka Fennec hits beta; Is Google security deceptive/inadequate? Are iPhones causing mistrials nationwide?
Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by HP
rule

HP 5 Questions to Ask about Network Automation
Visibility into the global network is key to maximum uptime. You can't fix what you can't see and having a view into the global network ensures the ability to; identify and resolve problems quickly, prevent configuration mistakes, enforce best practices and manage the network from a central location. Learn what to ask when evaluating your network management system. Read this whitepaper today.

rule

Spotlight Story

Rootkit code to exploit major Intel chip flaw to be posted Thursday
By Jamey Heary
This is the scariest, stealthiest, and most dangerous rootkit I've seen come around since the legendary Blue Pill! No, I'm not just trying to sensationalize this or spread fear, uncertainty and doubt. This is serious and represents a massive new security threat for us all. Security Researchers Joanna Rutkowska and Loic Duflot are planning to release a research paper + exploit code for a new SMM (System Management Mode) rootkit that installs via an Intel CPU caching vulnerability. Read full story

Related News:

News podcast: Network World 360
The number of computer science majors enrolled at U.S. universities increased for the first time in six years, according to a Computing Research Association study being released Tuesday. Also, economic conditions have caught up with IT shops in a big way, and two financial analyst firms have new IT spending forecast data to prove it. (7:30)

What IBM/Sun talks could mean for cloud computing
Just as rumors that IBM is considering an acquisition of Sun Microsystems cropped up Wednesday, Sun announced a new cloud computing service that will compete against Amazon’s online storage and computing platforms.

Mobile Firefox aka Fennec hits beta
The mobile version of the popular Firefox Web browser is now available in beta release from Mozilla, but only on one mobile device. One big addition: a much faster JavaScript compiler.

Cisco UCS: The morning after
Frey: So here we are, two days after Cisco has made their big announcement, and the mud-slinging is in full blossom. Juniper, HP, and BLADE Technologies (the blade switching vendor that HP and IBM sell via OEM) have taken their shots, calling Cisco “plumbers” and bemoaning their proprietary approaches. Sun even lobbed a grenade at Cisco’s core business, claiming they can use open software and standard computing hardware to compete in the router and switch business (not a new concept, by any means, and one which still lacks any real credibility). And this morning, IBM appears to be making a consolidating move in the server marketplace by sizing up Sun for acquisition – pure coincidence, or defensive move?

Is Google security deceptive/inadequate?
The Electronic Privacy Information Center (EPIC) thinks so. It just issued a 15-page complaint to the U.S. Federal Trade Commission (FTC) urging it to launch an investigation into Google's cloud security/privacy practices. And the case may just force enterprise users to rethink their commitments to cloud-based services.

Ten iPhone 3.0 Features You'll Love
Apple Tuesday unveiled iPhone OS 3.0 which boasts over 100 new features. Unfortunately, we will have to wait until the summer to get our hands on the new iPhone operating system. To tide you over until then, take a look at 10 iPhone 3.0 features that look the most promising. Plus:
How to Recreate 13 iPhone 3.0 Features Right Now!

Are iPhones causing mistrials nationwide?
According to a report in Tuesday's New York Times, there have been at least three cases nationwide -- in journalism, three = TREND! -- that point to what may become a larger problem: jury members using iPhones, BlackBerries, and other mobile devices to access the Internet, including Facebook and Twitter, during a trial. The resulting jury contamination can be used as a reason for throwing out the case and starting over.

New Endpoints Enable "Touch Telephony"
Nickasch: The VoIP endpoint market has been an extremely one lately, with the introduction of many new devices by a wide variety of vendors. I recently discussed the Polycom VVX 1500, a new hybrid voice and video device that boasts a new and intuitive touch-based UI. While recent offerings by Snom and Avaya offer similar interfaces, the Polycom VVX's clear advantage is the integration of video into the device.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by HP
rule

HP 5 Questions to Ask about Network Automation
Visibility into the global network is key to maximum uptime. You can't fix what you can't see and having a view into the global network ensures the ability to; identify and resolve problems quickly, prevent configuration mistakes, enforce best practices and manage the network from a central location. Learn what to ask when evaluating your network management system. Read this whitepaper today.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.

 

03/18/09

Today's most-read stories:

  1. Computer science major is cool again
  2. Report: IBM is in talks to buy Sun
  3. Rootkit to exploit Intel chip flaw to be posted 3/19/09
  4. Apple previews Version 3.0 of iPhone OS
  5. Cisco rivals size up UCS with usual reaction: caveat emptor
  6. Google Voice: GrandCentral grows up!
  7. Road signs hacked in NYC
  8. What Cisco's UCS means to management vendors?
  9. Web inventor Berners Lee conned by fake Web site
  10. A 10-piece sampler from Microsoft's patent pipeline
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


IDC Software as a Service Summit
The IDC Software as a Service Summit brings together senior IT and line of business executives to learn how SaaS and SaaS in a cloud present new opportunities that enable significant cost savings, agility, speed and achieve overall business value despite the turbulent business climate.
Find out more!



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment