Search This Blog

Thursday, January 27, 2011

Hackers turn back the clock with Telnet attacks

Facebook blames Zuckerberg embarrassment on API 'bug' | Do you know how much your IT costs?

Network World Daily News AM

Forward this to a Friend >>>


Hackers turn back the clock with Telnet attacks
A new report from Akamai Technologies shows that hackers appear to be increasingly using the Telnet remote access protocol to attack corporate servers over mobile networks. Read More


WEBCAST: Cisco & Citrix

Regain Control of the Desktop
Learn how one IT organization is realizing the benefits of Desktop Virtualization and find out what they did to ensure a successful deployment of VMware View 4.5. Learn More

RESOURCE COMPLIMENTS OF: Netezza

Get Proof. Not Promises.
Take the TwinFin Test Drive. Your site. Your data. Our technology. Experience the high-performance and operational simplicity of the IBM Netezza TwinFin data warehouse appliance first-hand. Our open Proof of Concept allows you to test the TwinFin with your most demanding, real-world analytics challenges. Learn More.

Facebook blames Zuckerberg embarrassment on API 'bug'
Facebook is blaming Tuesday night's embarrassing defacement of CEO Mark Zuckerberg's Facebook fan page on an API "bug" that allowed unauthorized persons to post not only on his page but those of an undisclosed number of other users. Read More

Do you know how much your IT costs?
For years, enterprise IT departments could be fuzzy about the costs of individual IT services and applications, but tight budgets and the relative clarity of cloud computing costs have forced CIOs into sharp focus. Read More

Google previews tablet-optimized Android 3.0
Google Wednesday released a preview of the software development kit for Android 3.0, which has been designed specifically for mobile devices with larger screens, particularly tablets. Read More


WHITE PAPER: Riverbed

5 Key Principles to Redesign IT Infrastructure
Wide Area Data Services can bring the distributed enterprise closer together. Read this paper to learn the 5 key principles you can leverage to redesign an environment of any size and provide better support for distributed employees and improved business continuity during a disaster. Read now!

Cisco content gateway vulnerable
Cisco this week issued a security advisory for its Content Services Gateway, which runs on the Service and Application Module for IP. Read More

Top 10 Free Windows 7 Desktop Themes
Take a cue from thousands of PCWorld readers, and try one of these popular downloadable themes. You can decorate your desktop with beautiful high-def images of tropical fish, exotic landscapes, and adorable pets -- or just make your PC look like a Commodore 64. Read More

AT&T vs. Verizon: iPhone plans duke it out
Now that Verizon has confirmed its data plan price for the iPhone, U.S. customers can compare the ongoing costs of owning an Apple smartphone. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Smart cards no match for online spies
The U.S. government has been stepping up its use of smart cards to help lock down its computer networks, but hackers have found ways around them. Read More

Egypt's move to block Twitter a sign of social media influence
The Egyptian governments move to shut down access to Twitter in the country indicates how powerful social media can be as a protest tool. Read More

Obama turns attention to supercomputing
President Barack Obama's State of the Union Speech was so technology-focused that it buoyed expectations that U.S. investment in IT, particularly supercomputing, will survive his other plan to freeze domestic spending for five years. Read More

Open Source FAIL
I recently read an interesting blog on Open Source and ERP from Derek Singleton titled "Can Open Source ERP Succeed?" His blog focused on the ERP segment of the market and why no open source solution has succeeded. Read More

Should Walking While Distracted be a Crime?
You have been found guilty of texting while walking. That'll be $100, and we're not talking iTunes credit. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

Panic time quiz: How prepared are you for IPv6?
With IPv4 addresses projected to dry up this year, it's inevitable that IPv6 adoption will accelerate. Here are a few questions that can help determine how much or how little you know about IPv6 and whether you ought to spend more time studying it.

The Mac App Store's hottest productivity apps
The Mac App Store debuted this month and hit 1 million downloads in the first 24 hours. The App Store launched with 1,000 or so apps, many of which were already available on the pre-existing Mac downloads Web site. The store is filled with stuff that's fun but also has plenty of apps that make you more productive. Let's take a look at the 10 most downloaded free productivity apps on the Mac App Store, and then we'll look at the 10 most popular paid productivity apps.

MOST-READ STORIES

  1. Apple's e-wallet won't replace the one I'm sitting on
  2. Most mobile users will buy new 'dumb' phones
  3. Intel developing security 'game-changer'
  4. Top 10 Web hacking techniques of 2010 revealed
  5. Fedora 15 changes network device naming
  6. Google Voice offers up a number-porting kluge
  7. Gartner slams Cisco's single-vendor network vision
  8. Low-cost SSL proxy could bring cheaper, faster security
  9. Cisco win in AT&T domain drops Tellabs' Q4
  10. Cisco, Verizon enlist in 24-hour IPv6 trial

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: