Search This Blog

Tuesday, August 18, 2009

Hiring hackers (part 2)

IEEE program brings security vendors together; Twitter used to manage botnet, says security expert
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Certeon
rule

Global Media on Virtualization
In this whitepaper learn why Global Media Company has made a strategic decision to embrace a virtualization strategy and has made a significant investment in WAN acceleration for SharePoint, Microsoft's enterprise content management (ECM) and collaboration technology. See how Certeon's aCelera virtual appliance for WAN acceleration and optimization can save you 60% in capital and operations TCO over proprietary hardware solutions, while reducing your application response time to remote users by 95%.

Global Media on Virtualization

rule

Spotlight Story
Hiring hackers (part 2)

This is the second of a two-part series on hiring hackers and criminal hackers into information technology (IT) groups as programmers, network administrators and security personnel. Read full story

Related News:

IEEE program brings security vendors together
The IEEE standards group today announced an effort to bring security vendors together to collaborate on early-stage technologies.

Twitter used to manage botnet, says security expert
A security researcher has found that hackers are using Twitter as a means to distribute instructions to a network of compromised computers, known as a botnet.

Georgia cyberattacks linked to Russian organized crime
The cyberattacks against Georgia a year ago were conducted in close connection with Russian criminal gangs, and the attackers likely were tipped off about Russia's intent to invade the country, according to a new technical analysis, much of which remains secret.

Twitter used to manage botnet, says security expert
A security researcher has found that hackers are using Twitter as a means to distribute instructions to a network of compromised computers, known as a botnet.

IBM scientists build computer chips from DNA
Scientists at IBM are experimenting with using DNA molecules as a way to create tiny circuits that could form the basis of smaller, more powerful computer chips.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Cool BlackBerry games
Black HatBlackBerries are known for e-mail, but they are also getting better at mobile games. Here are 10 of the best.

Google facts
IT quizTake this quiz to see how well you know the company – and no fair googling the answers.

Beyond ROI Calculators: Real-World Security Savings
See how WatchGuard's security solutions could have saved two organizations millions if in place prior to the headline-making cyber attacks both experienced. These solutions could have mitigated or prevented the breaches entirely. Get the facts and realize how to effectively address your real-world security problems today.
Click here.


Managing IT Across Multiple Locations
Increasing demand and shrinking budgets can make systems management across multiple locations a frightening experience. Join us for this important FREE webcast August 18, 2009 and discover how you can efficiently manage hundreds of systems through one interface, saving time, hassle, money and resources.
Register now.

 

August 18, 2009

TOP STORIES | MOST DUGG STORIES

  1. Apple disasters
  2. When Apple flops: The worst products of all time
  3. Microsoft IE 8 shines in Web browser security test
  4. The 10 most idiotic iPhone apps
  5. The 10 worst video game systems of all time
  6. Large broadband providers pass up stimulus funding
  7. 10 cool things you didn't know about Google
  8. Twitter used to manage botnet, says security expert
  9. Windows 7 RTM -- a closer look
  10. FAQ: How to get Windows 7 on the cheap

IDC: Realizing the Benefits of Deduplication
Many organizations are grappling with rapidly growing storage requirements. IDC has found that those organizations are experiencing 50% growth in data, adding as much as 4TB of data each year.
IDC: Realizing the Benefits of Deduplication



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: