Search This Blog

Friday, May 28, 2010

New undersea cable feeds African botnets

Five indicted in cybertheft of city's bank accounts | Facebook Answers Critics With New Privacy Controls

Network World Security

Forward this to a Friend >>>


New undersea cable feeds African botnets
Spam coming from Africa could be about to boom thanks to new broadband infrastructure in the Eastern half of the continent, according to Symantec's MessageLabs division. Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

WHITE PAPER: ShoreTel

Conquer the Cost of IP Complexity
Companies are frequently tied to expensive, complex, legacy telecommunications systems that don't support modern technologies and applications, such as unified communications. This white paper examines the challenges associated with legacy systems and how to achieve greater value and opportunities with IP-based technology. Read More

Five indicted in cybertheft of city's bank accounts
Five people were indicted this week on wire fraud and other criminal charges stemming from a 2007 cybertheft in which nearly $450,000 was stolen from the bank accounts of the city of Carson, Calif. Read More

Facebook Answers Critics With New Privacy Controls
Facebook CEO Mark Zuckerberg today unveiled his company's revamped privacy tools in front of a corps of tech journalists that included organizers of last year's Facebook Redesign Revolt, PCWorld editors who drafted a Bill of Rights for Facebook Users, and many of the company's fiercest critics of its privacy policies. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Symantec readies Norton security, storage apps for Android, iPhone smartphones
Symantec's Norton division today launched its "Norton Everywhere" initiative aimed at bringing security protections and cloud-storage access to the Google Android and Apple iPhone smartphones. Read More

The firewall: Interview with blogger Daniel Kennedy
Daniel Kennedy, MSIA, graduated from the Master of Science in Information Assurance program in the School of Graduate Studies of Norwich University in 2008. He has recently become a contributor to an interesting, thoughtful and valuable blog at Forbes Online and I interviewed him recently about his new project. This is the first of a two-part interview. Read More


E-GUIDE: Compuware

5 Tips for Getting the Best Web App Performance
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps. Learn More Now

The hottest images of cool outer space
Black holes, hungry planets, weird orbits dominate space news Read More

Steve Ballmer as emoticons
It's not often hard to guess what Steve Ballmer is feeling. The Microsoft CEO has one of the most recognized, and photographed, faces in the IT industry ¿ and it's also one of the most expressive. Read More

Microsoft wins 18,000-seat cloud contract with University of Arizona
Score one for Microsoft in the cloud. The University of Arizona is moving 18,000 faculty and staff members to Microsoft's online e-mail and collaboration system, the university said today. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

40 days of summer (gadgets)
Summer's here and the time is right for looking at gadgets to make the summer days and nights go by easier or more fun at least. If you're going outside to enjoy the sun, hitting the road for a long road trip to a vacation destination, or just staying at home for the perfect "staycation", here are 40 devices or apps we think you'll like.

What if tech companies owned the Wonders of the World?
In this slideshow, we'll take a look into a future where broke governments are forced to sell their most treasured landmarks to the world's richest nerds.

MOST-READ STORIES

  1. Scientist 'infected by computer virus' catches publicity fever
  2. Six misconceptions about cloud apps
  3. WWDC Preview: Apple waging three big fights
  4. Sneaky browser 'tabnapping' phishing tactic surfaces
  5. Winner and still champ, DoNetNuke
  6. Wi-Fi vendors face off
  7. Cisco powers up router, switches for smart grids
  8. 44 million stolen gaming credentials found in online warehouse
  9. The 10 best hacks of 2010 (so far)
  10. Steve Ballmer as emoticons

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: