IEEE program brings security vendors together The IEEE standards group today announced an effort to bring security vendors together to collaborate on early-stage technologies. Twitter used to manage botnet, says security expert A security researcher has found that hackers are using Twitter as a means to distribute instructions to a network of compromised computers, known as a botnet. Georgia cyberattacks linked to Russian organized crime The cyberattacks against Georgia a year ago were conducted in close connection with Russian criminal gangs, and the attackers likely were tipped off about Russia's intent to invade the country, according to a new technical analysis, much of which remains secret. Twitter used to manage botnet, says security expert A security researcher has found that hackers are using Twitter as a means to distribute instructions to a network of compromised computers, known as a botnet. IBM scientists build computer chips from DNA Scientists at IBM are experimenting with using DNA molecules as a way to create tiny circuits that could form the basis of smaller, more powerful computer chips. August Giveaways Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31. Network World on Twitter? You bet we are |
No comments:
Post a Comment