Search This Blog

Thursday, December 10, 2009

The most important Microsoft products of 2009

FTC sues to stop robocallers; Guard Your Online Privacy With Firefox Addon
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Cisco IronPort
rule

Cisco SIO To Go for iPhone
Powered by Security Intelligence Operations, It's like having a security expert in your pocket.

Learn More Now

rule

Spotlight Story
The most important Microsoft products of 2009

What were the most important product releases from Microsoft in 2009? Network World has made our picks. In David Letterman style, here they are. (Click the links to read our rationale of why each product made it to the list.) Read full story

Related News:

FTC sues to stop robocallers
The Federal Trade Commission today said it was going after three outfits that allegedly made robocalls to sell worthless credit-card interest-rate reduction programs for large up-front fees of as much as $1,495.

Guard Your Online Privacy With Firefox Addon
As you browse the Web, Web sites watch you. Information is gathered about you, potentially shared with others, and possibly kept for a very long time. Which sites gather this information and which don't...and what do they do with the information? There's no practical way to know--unless you use TrackerWatcher, that is. This excellent, free Firefox add-on checks the privacy tracking features of Web sites you visit, and reports the results to you in great detail.

View the hottest new rap video: The sensational Cisco Catalyst 6509 NetFlow rap song
Network performance measuring vendor - Plixer International, released this evening its new rap video featuring the geeky but highly talented Cisco NetFlow hip-hop rap sensation - Mix Master Mitch: Cisco Catalyst 6509 NetFlow Rap

Data security risks
Confidential data (i.e. regulated data, private data, company confidential data, PII, etc.) is everywhere -- on laptops, thumb drives, file servers, and enterprise storage devices. This also means that confidential data is at risk everywhere. In other words, my organization could suffer a data breach as a result of a stolen laptop, external hacking exploit, or lost box of backup tapes. This...

TSA posts document on airport screening procedures online
In a gaffe called "shocking" and "reckless" by some U.S. lawmakers, the Transportation Security Administration inadvertently posted online a 93-page document containing highly sensitive information on airport screening procedures.

Computer of alleged Sarah Palin hacker had spyware
The 21 year-old college student charged with hacking former Alaska Governor Sarah Palin's Yahoo e-mail account was using a compromised computer that was secretly logging and reporting information without his knowledge, his lawyers say.

Adobe bends, a little, on eBook DRM
Responding to criticism that its anti-piracy mechanisms could slow the growth of the eBook industry, Adobe Systems plans to liberalize its approach toward Digital Rights Management with eBooks.

Facebook simplifies privacy options
Following through on plans announced a few months ago, Facebook is rolling out changes on Wednesday to its privacy settings intended to make them simpler to adjust and understand by its 350 million end users.

Microsoft patches 12 bugs, including IE8-only flaws
Microsoft today patched 12 vulnerabilities in Windows, Office and Internet Explorer, including three critical bugs in the company's newest browser, IE8.

Today from the Subnet communities

On Cisco Subnet: Amazon EC2 and Symantec: What Does it Mean? and Way too Easy: Dynamips Under Linux; On Microsoft Subnet: How To Run Windows 7 Virtualized on Mac OS X; On Google Subnet: Make money on Android? Mobile Ad Cents

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Secure in 15 - Start with Daily Practices
Get the Secure in 15 toolkit starting with the "15 Minutes Month-at-a-Glance" calendar. McAfee will send you additional tools and tricks to stay protected around the clock.
Click here to learn more.


When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.

 

December 10, 2009

MOST-READ STORIES

  1. Reasons not to buy Cisco
  2. Microsoft releases six new patches
  3. FTC sues to stop robocallers
  4. A hands-on tour: Google Goggles Visual Search
  5. Can you work on a virtualized Windows desktop?
  6. Facebook shuts down Beacon program, settles lawsuit
  7. Network IPS tests reveal equipment shortcomings
  8. How to fight malware
  9. Man lost $127M at casinos owned by Cisco customer
  10. Network router cheat sheet

Enabling HIPAA/HITECH Compliance
As healthcare organizations and vendors become more reliant on digital information, complying with increasing regulatory requirements presents challenges. This paper explores the requirements, best practices for implementing identity management systems that help ensure compliance, and Sun's simplified approach.
Learn More



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: