Tuesday, May 31, 2011

5 top social media security threats

4G faceoff: ThunderBolt vs. Galaxy | Worst hackers ever?

Network World Daily News AM

Forward this to a Friend >>>


5 top social media security threats
Social media platforms such as Twitter, Facebook and LinkedIn increasingly are being used by enterprises to engage with customers, build their brands and communicate information to the rest of the world. Read More


WHITE PAPER: F5 Networks

Magic Quadrant for Application Delivery Controllers, 2010
The market for ADCs is consolidating. However, innovation continues, especially among some select smaller players. Although there are clear leaders in the ADC market, enterprises should focus their buying decisions on a vendor's ability to support specific application requirements. Learn more!

WHITE PAPER: IBM

Distributed Virtualization Management from Big Iron
Many enterprises started virtualization efforts to reap the benefits of consolidating their distributed infrastructure. This consolidation, however, has not ended datacenter infrastructure heterogeneity since enterprises seem intent on acquiring different virtualization platforms as well as heterogeneous hardware platforms. Read Now

4G faceoff: ThunderBolt vs. Galaxy
With 4G smartphones hitting the market in a big way, we decided to test a couple of devices to get an overall sense of how 4G compares with 3G, how specific devices perform and how the underlying networks differ. Read More

Worst hackers ever?
We always hear about the big data breaches, the most devastating viruses, and the most denying of the denial-of-service attacks. But for every hacker with that level of deviousness, there are a thousand wannabes out there. Some get ridiculed, some get arrested. Here are a few favorites, as reported by the Internet: 1. "Virus" targets Whac-A-Mole Read More

Four Simple Ways to Install Enterprise Apps
While you can install any software on the Linux desktop with just a couple of mouse clicks, enterprise apps are a different story, because they require a lot of infrastructure software, from high-end web and database servers to basic libraries. As a system administrator you may spend hours putting together components before you can deploy an app on the network. Fortunately, some convenient software... Read More


WHITE PAPER: Diskeeper Corporation

NEW Diskeeper 2011 Pro Premier Edition
Diskeeper 2011 Pro Premier edition provides essential performance and efficiency increases for power workstation users as well as all the features of the Professional edition. Learn more!

Lockheed Martin acknowledges 'significant' cyberattack
Lockheed Martin Saturday night acknowledged that it its information systems network had been the target of a "significant and tenacious attack," but said that its security team detected the intrusion "almost immediately and took aggressive actions to protect all systems and data." Read More

PBS hacked by LulzSec: Lulz Boat Sailed, PBS Failed
Sunday night, after the Public Broadcasting System aired a documentary on WikiLeaks, displeased hacktivists from LulzSec sailed its "Lulz Boat" to PBS servers. The group posted a bogus news story to the PBS's Newshour website, claiming that reports of rapper Tupac Shakur's death in 1996 had been grossly exaggerated. In fact, the news stated that Tupac had been found "alive and well," living in New... Read More

Intel launches new class of 'Ultrabook' laptops
Intel announced plans for a new class of thin and light laptops at the Computex trade show on Tuesday, its latest move to improve its competitiveness in the mobile computing market. Read More


WHITE PAPER: Dell

Converged Communications: People and Applications in Synch
Most small and midsize organizations find implementing unified communications a daunting task, between lack of in-house expertise and complex integration issues, it's easy to back burner this project. Find out how to implement a communications strategy in this Collaboration KnowledgeVault. Learn more

Preparing for World IPv6 Day
World IPv6 Day (June 8, 2011) is approaching in about a week. This will be a landmark day for IPv6 Internet connectivity and IPv6-capable content providers. You will want to be prepared for this historic day in networking. This article will give you the background on what is happening on that day and how to help your organization be ready for the fun. Read More

Microsoft downplays IE 'cookiejacking' bug
Microsoft today downplayed the threat posed by an unpatched vulnerability in all versions of Internet Explorer (IE) that an Italian researchers has shown can be exploited to hijack people's online identities. Read More

Mobile Accessories for Your Tablet
Pick one of these gadgets to accompany your shiny new tablet and your on-the-go lifestyle. Read More

Hidden URLs in phone and tablet browsers
Internet users should be extremely cautious before installing upcoming netbook/tablet PC versions of Google Chrome and Mozilla Firefox which hide the URL of Web sites that users visit – a technique known as compact Web page navigation. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

7 things we love about Drupal 7
Drupal. the open source Content Management System (CMS) used to power everything from personal sites to the White House's Web site, is legendary for its flexibility and power. Here are the best things about it.

MOST-READ STORIES

  1. Windows 1.0: Still playing Reversi after all these years
  2. IE flaw could allow hackers access to accounts
  3. Apple sues teenager who sold white iPhone 4 conversion kits
  4. RSA tokens may be behind network security problems at Lockheed Martin
  5. Skype voice service crashes; users offered fix instructions
  6. Google Wallet: Five things you need to know
  7. Cisco is a top 3 server vendor
  8. Microsoft not to blame for Skype rejecting open source company
  9. Two convicted in U.S. over counterfeit Cisco gear
  10. Insider data theft costs Bank of America $10 million

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment