Search This Blog

Wednesday, January 12, 2011

Symplified a company to be reckoned with

5 Microsoft security flaws remain unpatched, despite 2 fixes | Hacked iTunes accounts taken off China e-commerce site

Network World Security: Identity Management

Forward this to a Friend >>>


Symplified a company to be reckoned with
Read More


WHITE PAPER: ParAccel

Maximizing IT Insight for Financial Services
This white paper outlines these challenges and provides a clear path to providing the accelerated insight needed to perform in today's complicated business environment to reduce risk, stop fraud and increase profits. Read now!

WHITE PAPER: F5 Networks

Delivering Virtual Desktop Infrastructure
The benefits of moving to a virtual desktop infrastructure can easily be negated by an unreliable or poorly performing implementation. A joint F5-Microsoft solution can improve performance, increase reliability, and enable the seamless scalability of a Microsoft VDI implementation. Read now!

5 Microsoft security flaws remain unpatched, despite 2 fixes
Microsoft kicks off 2011 with light Patch Tuesday Microsoft gave the security a world a light Patch Tuesday today, with only two updates, after issuing a record 106 security bulletins in 2010 and 17 in December alone. But that doesn't mean Microsoft products have no holes in them. In fact, security researchers say there are five unpatched zero-day flaws that Microsoft is still working to fix. Read More

Hacked iTunes accounts taken off China e-commerce site
The sale of hacked iTunes accounts in China has been dealt a blow as the Chinese online retailer Taobao.com has decided to remove all product listings relating to the sale of the stolen accounts. Read More


WHITE PAPER: Extreme Networks

Four Pillar Strategy for Next Generation Data Centers
Enterprises today are migrating from a purely physical infrastructure to a highly efficient virtualized infrastructure and potentially to a fully enabled cloud environment. This migration promises to greatly enhance the efficiency and scalability of data center operations. Read now!

IBM: Electric cars face consumer concerns despite high interest
IBM study shows electric car pitfalls, potentialHigh gas prices alone will not fuel an electric car revolution, rather if the auto industry could address a variety of other concerns having to do with recharging, convenience and cost it would Read More

Intrusion protection tools improve on tests
The latest tests of crucial equipment used to protect Internet-facing corporate networks show they are improving but are far from perfect in stopping hacker attacks. Read More


DOWNLOAD: Diskeeper

Get More System Speed and Reliability
Without Diskeeper, every server suffers from fragmentation. Only Diskeeper cures and prevents fragmentation and maximizes the performance and stability each server was designed to deliver. Costs far less than trying to run a site without it. Read More

Security firm: Facebook is biggest mobile malware threat
The biggest mobile infection threat isn't malware that specifically targets mobile devices, according to new research from security firm BitDefender. Malware that targets Facebook is a far bigger problem for mobile security, the firm claims. Read More

Top 10 Tech Scares of the Decade
The dawn of the new millennium prompted fears about the future, but so far reality has not quite matched the predictions of catastrophe. The first ten years passed uneventfully--well, aside from Y2K and a bunch of intelligent computer viruses. Here's a look back at the past decade, and ten of the most terrifying tech scares. Read More

Cloud Computing Used to Hack Wireless Passwords
German security researcher Thomas Roth has found an innovative use for cloud computing: cracking wireless networks that rely on pre-shared key passphrases, such as those found in homes and smaller businesses. Read More

Mobility management in 2011 and beyond
Let's hope that 2011 is a year when mainstream enterprises start getting serious about mobility management and security. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

The weirdest, wackiest and stupidest sci/tech stories of 2010
It's hard to pick the weirdest and wackiest tech stories of 2010 considering there is so much nuttiness to choose from. But we'll give it a shot. Here we take a look at a number of stories that gave us pause in 2010.

2010's most popular iPad apps
As the iPad celebrates its first birthday, it should raise a glass to Apple's App Store, which has provided users with an array of innovative applications. Late last week, Apple released a list of the 10 most popular iPad applications, with productivity apps making up the bulk.

MOST-READ STORIES

  1. What Verizon's network can -- and can't -- give iPhone users
  2. Apple and Verizon: The bumpy road to love
  3. Apple iPhoneys: the iPhone 5 edition
  4. Verizon to make iPhone announcement tomorrow
  5. Gov't allegedly forced TruTV to yank FEMA camps episode
  6. Cisco compacts Catalyst switches
  7. Steve Ballmer ousts Bob Muglia from Microsoft
  8. Digg founder: Don't buy an iPad now
  9. AT&T exec says CDMA iPhone users won't like 'life in the slow lane'
  10. NSA breaks ground on Utah 'spy center' data center

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: