Search This Blog

Tuesday, April 20, 2010

Hot spot dangers: That Internet cafe could cost you way more than a cup of coffee

Larry Ellison in Pictures: It's Good to Be The King | Is Network Security a Dead End Career?

Network World Daily News PM

Forward this to a Friend >>>


Hot spot dangers: That Internet cafe could cost you way more than a cup of coffee
Security experts say that employees are increasingly exposing personal and professional information unknowingly as they log in at Wi-Fi hot spots. Although these breaches haven't yet made big headlines, given corporate America's increasing reliance on smartphones, laptops and other portable devices, it's only a matter of time, experts say. Read More


DOWNLOAD: BlackBerry

Free Download from RIM
BlackBerry Enterprise Server Express offers IT control and security features you can trust even for employees that choose to bring their own BlackBerry smartphones into your business. Download this free license to support up to 75 users on your existing Exchange Server. Download Now.

WHITE PAPER: Aruba Networks

Network Rightsizing Best Practices Guide
Network Rightsizing is an evolutionary approach to network design that significantly reduces costs while simultaneously increasing mobility for campus and enterprise users. This guide provides a methodology to enable IT to break away from the status quo of port-based network architectures, allowing an unprecedented reduction in cost and complexity. Read More!

Larry Ellison in Pictures: It's Good to Be The King
The $28 billion net worth. The jets. The megayacht. The wedding pictures taken by Steve Jobs. (Yes, that Steve Jobs.) Take a look the posh perks of being Larry Ellison. Read More

Is Network Security a Dead End Career?
Hard to believe that I ever thought I would be sitting here wondering about the state of security as a viable career path. I have built my career up as a security dude/hacker for years, but lately I have been noticing a few things. Read More

Gov't regulators call on Google to respect users' privacy
Ten government regulators responsible for protecting the private information of their countries' citizens have sent an open letter to Google calling on the company to respect national laws on privacy. Read More

Palin e-mail hack trial starts today
The former college student who in 2008 allegedly hacked into a Yahoo e-mail account used by Sarah Palin -- then governor of Alaska and Republican vice presidential candidate -- goes on trial today in Tennessee and of this much you can be certain: The case will be more of a media and political circus than groundbreaking legal proceeding. Especially since Palin herself is expected to testify. Read More


WHITE PAPER: Sprint

SIP Addresses Unified Communications Deployment
This white paper gives strategic guidelines for deploying UC. Read why SIP matters. Read More

Broadband has no regulator, BitTorrent CEO says
The Internet industry has to regulate itself by responding to consumer demands in the wake of the recent U.S. federal court ruling that the Federal Communications Commission didn't have authority to enforce its net neutrality rules, BitTorrent CEO Eric Klinker said Monday. Read More

Gizmodo names Apple employee who lost the prototype "iPhone 4G"
Gizmodo has revealed that the person who lost the purported next generation iPhone is a 27-year-old Apple software engineer named Gray Powell, who probably will never again be as famous, or notorious, as he is right now. Read More

News podcast: Network World 360
Ten government regulators responsible for protecting the private information of their countries' citizens have sent an open letter to Google calling on the company to respect national laws on privacy. Also, A new cloud storage company is launching with software designed to ease deployments with platforms such as Amazon's Simple Storage Service and EMC's Atmos Online. (5:12) Read More

A Camera for the iPad? I Don't Think So
Any release 1.0 product is going to have issues, problems, and missing features. And early adopters, the intended market, don't care. They want the latest, greatest, and coolest, and they are completely unconcerned if the product isn't perfect. Most of them, I think, get a secret biochemical rush just showing the device to their friends. Read More


VIRTUAL EVENT: CIO, Computerworld, CSO, InfoWorld & Network World

Live Security Panel – April 28th
Join us on April 28th for a live virtual event that will provide candid, expert advice on top security challenges and issues – all from the comfort of your desktop. Get in on the discussion - from the unique challenges presented by cloud computing and virtualization to the mass adoption of social media. Attend and you may win a Kindle!

Report: Google attack targeted 'Gaia' password system
The information stolen from Google in cyberattacks late last year included a password system that gives users access to multiple services after just one login, according to a news report. Read More

China warns against IBM slogan 'Smarter Planet'
A Chinese official appeared to take aim at IBM as he warned recently against "Smarter Planet" projects, or the use of technology like networks of sensors in cities to gather and analyze data. Read More

Future of SF admin Terry Childs now in jury's hands
Terry Childs' battle to avoid being convicted over what his supporters characterize as a workplace dispute gone wrong is almost over. Read More

Cisco closes Tandberg video acquisition
Cisco Systems closed its acquisition of Tandberg on Monday, formally ending a tense struggle over the fair value of the Norwegian videoconferencing vendor. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

12 "White Hat" hackers you should know
These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up - as they try to stay one step ahead of their underground "Black Hat" cousins.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Why computer science students cheat
  2. Gizmodo names Apple coder who lost "iPhone 4G"
  3. Network Solutions sites hacked again
  4. Your BlackBerry's dirty little security secret
  5. Left 4 Dead 2's first DLC due next week
  6. Poor AT&T coverage reported at Coachella music festival
  7. Storage smackdown: Hard drives vs. SSDs
  8. 5 hot IT certification picks for 2010
  9. Vendors prep for 40/100G, more data center virtualization
  10. HP boasts "Cisco free" data center with 3Com portfolio

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: