Wednesday, October 31, 2012

7 Scariest Tech Monsters | iPad Mini spoof video

  Coolest tech-o-lanterns | iPad Mini: "It's the future until May...at least" (Apple spoof video)
 
  Network World After Dark

Forward this to a Friend >>>


The 7 scariest monsters in tech
Ghastlier than malware, these IT hellions can turn your tech department into a horror show -- quick Read More


WHITE PAPER: Cisco

IDC Report: Lost in the Cloud? Automate with Cisco
Private clouds create IT challenges that can limit increases in production, even hinder agility. Find out why enabling self-service and automated end-to-end provisioning with Cisco Intelligent Automation for Cloud may be the solution. Read Now

WHITE PAPER: Riverbed

How to Improve Data Center Security while Reducing Sprawl
Download this useful case study to learn how organization's like yours have benefitted from improved data security and performance through snapshotting, encryption, and removal of storage media from remote offices. Learn more.

Coolest tech-o-lanterns
Happy Halloween. Here's our collection of creative tech-o-lanterns, modernized to include the latest in iPad- and iPhone-themed pumpkins. Mostly treats, with maybe a trick or two tossed in. Read More

iPad Mini: "It's the future until May...at least" (Apple spoof video)
Banned iPad Mini Promo takes Apple to task for being...Apple, walking viewers through the complicated differences between Apple tablets and devices new and old: Read More

What Does Disney Buying Star Wars Have To Do With Open Source?
Big as in Four Billion Dollars big, news yesterday that Disney acquired Lucasfilm including the Star Wars franchise from its single sharehol Read More

Why there's no need to prosecute Twitter 'Sandy' troll
A New York City official is urging the Manhattan district attorney to consider bringing charges against one Shashank Tripathi, who goes by the obnoxious name @comfortablysmug on Twitter and used that account to spread alarmist lies during Hurricane Sandy. Charging Tripathi would be a bad idea ... and unnecessary. Read More

Trick or Treat: Top 10 Halloween apps for iPad, iPhone, and iPod touch
Carved pumpkins, cobwebs and creepy crawlies are out in force as Halloween approaches, so we've rounded up some spooky apps for your iOS devices to celebrate this frightening occassion. Read More

Torvalds on laptops: Make higher-def resolution standard
The outspoken creator of Linux, Linus Torvalds, called for laptop makers to follow the tablet world's lead in using the highest-resolution displays possible on mobile devices, in a post on Google Plus. Read More

Live Blog: How Enterprise IT is coping with Hurricane Sandy
[View the story "Live Blog: Enterprise IT copes with Hurricane Sandy" on Storify] Read More

MIT's 'Like a Hug Vest' for Facebook is weird and interesting
As we continue to spend more and more of our waking ours engaged in online activity, it's increasingly common to hear people argue that we as a society are becoming more isolated from one another. As our day to day interactions with other individuals are now commonly taking place via the computer - whether it be via email, Twitter or Facebook - many have expressed concern that the ability to relate... Read More

Halloween for gamers: Tetris+Pumpkin=Pumpktris
Just when you thought Halloween couldn't get any geekier, we bring you Pumpktris, a combination of a jack-lantern and the classic game of Tetris. Read More

FBI cybersecurity shift draws skepticism from experts
The FBI has changed its cybersecurity strategy to place greater emphasis on identifying the criminals behind attacks, a shift that some experts say won't make a dent in hacking operations. Read More

Bank phishing gang arrested after hotel swoop
UK police have arrested three men accused of being involved in large-scale Trojan phishing attacks against a range of banks. Read More

Researcher warns "zombie browsers" are skyrocketing
Some Web browsers can be tricked into using so-called "malicious extensions" that can give hackers the ability to hijack the user's session, spy on webcams, upload and download files, and in the newer mobile-device area, hack into Google Android phones. Read More

Products of the week 10.29.12
Our roundup of intriguing new products from companies such as AirWatch, AnyMeeting and UC4. Read More

 
 
 

SLIDESHOWS

First look: Windows 8 Surface RT
Surface RT, the Microsoft-built tablet/notebook, offers a sleek design and sturdy feel.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Irked by cyberspying, Georgia outs Russia-backed hacker -- with photos
  2. First look: Google's Nexus 10 tablet
  3. Windows RT Surface tablet boasts excellent design, but it's still a tough sell
  4. EFF, 9 other groups, push Open Wireless Movement
  5. Microsoft greases the skids for Windows 8 developers
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. Cisco network really was $100 million more
  8. .xxx to launch porn search engine
  9. 2012 tech industry graveyard
  10. Want a security pro? For starters, get politically incorrect and understand geek culture
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

[SECURITY] [DSA 2570-1] openoffice.org security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512


- -------------------------------------------------------------------------
Debian Security Advisory DSA-2570-1 security@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
October 31, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openoffice.org
Vulnerability : remote
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-4233
Debian Bug :

High-Tech Bridge SA Security Research Lab discovered multiple null-pointer
dereferences based vulnerabilities in OpenOffice which could cause
application crash or even arbitrary code execution using specially crafted
files. Affected file types are LWP (Lotus Word Pro), ODG, PPT (MS Powerpoint
2003) and XLS (MS Excel 2003).

For the stable distribution (squeeze), this problem has been fixed in
version 1:3.2.1-11+squeeze8.

openoffice.org package has been replaced by libreoffice in testing (wheezy)
and unstable (sid) distributions.

For the testing distribution (wheezy), this problem has been fixed in
version 1:3.5.4+dfsg-3.

For the unstable distribution (sid), this problem has been fixed in
version 1:3.5.4+dfsg-3.

We recommend that you upgrade your openoffice.org packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
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=hToM
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/20121031203732.8E9CA1B49@scapa.corsac.net

Deadline November 12: Submit Your Speaking Proposal for SNW Spring 2013

Please consider proposing a presentation for the upcoming SNW Spring 2013 conference taking place April 2-5, in Orlando, Florida. 

Produced by Computerworld and co-owned by Computerworld and the Storage Networking Industry Association (SNIA), SNW is the leading global event series focused on the advancements in, and implementations of, storage, data center, networking, cloud and information infrastructure technologies.

Throughout this four-day conference, attendees from major public and private sector organizations will learn about the latest user successes and challenges, as well as products, tools and services.

SNW case studies can be proposed in the following track areas and submitted online at http://presenters.computerworld.com/2013/SNW by Monday, November 12th: 

Backup and Archiving
Consumerization's Impact on the Enterprise
Cloud Computing
Data Center/Data Center Networking
Data Management
Data Security
Solid State
Storage Management
Storage Networking
Virtualization


For more information on SNW, please visit: www.snwusa.com

Thank you for your support of SNW and we look forward to receiving your proposal for SNW Spring 2013!

 

Forward this to a Friend >>>

SUBSCRIPTION SE RVICES - You are currently subscribed as security.world@gmail.com. If you do not wish to receive future mailings from Computerworld's SNW, need to change your email or other preference, please visit us here.

View Computerworld's online privacy policy

Copyright 2012 | Computerworld Inc. | 492 Old Connecticut Path | Framingham MA 01701 | www.computerworld.com

Caveats for VPN users in public Wi-Fi hotspot networks

  The tech world's 'all Halloween' team | Live Blog: How Enterprise IT is coping with Hurricane Sandy
 
  Network World Daily News PM

Forward this to a Friend >>>


Caveats for VPN users in public Wi-Fi hotspot networks
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft, data theft, snooping, impersonation and malware infection. That's why so many people rely on public virtual private network services, but VPNs are no panacea. Here are five potential gotchas. Read More


RESOURCE COMPLIMENTS OF: APC by Schneider Electric

Deploy your IT space with speed, not complexity
Protect your IT system uptime easily your IT deployed with APC by Schneider Electric InfraStruxure™ solutions. Our simple, adaptable, and manageable all-in-one physical infrastructure is designed as an easy-to-deploy system to allow for flexible management and physical IT deployment and, by extension, system uptime. Make the most of your IT space! Download our top three solution guides today and enter to win an iPad® 2!

WHITE PAPER: F5

Scale Your DNS Infrastructure to Protect Your Business
DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. This paper helps organizations confronting these growth and security challenges understand how a new, full-proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing. Learn More.

The tech world's 'all Halloween' team
In honor of today being Halloween I thought I would write a blog dedicated to the horror and grim nature that the day brings. Here are a few people and companies -past and present - that make the "all Halloween" list of technology names. Monster.com Read More

Live Blog: How Enterprise IT is coping with Hurricane Sandy
[View the story "Live Blog: Enterprise IT copes with Hurricane Sandy" on Storify] Read More

Top Linux-o-lanterns from around the Web
Tux the Penguin and friends geek up Halloween pumpkins Read More

Stolen cellphone databases switched on in US
U.S. cellphone carriers took a major step on Wednesday toward curbing the rising number of smartphone thefts with the introduction of databases that will block stolen phones from being used on domestic networks. Read More


WHITE PAPER: Symantec

Taking the Leap to Virtualization
Read this whitepaper to learn how virtualization offers dramatic benefits for midsize companies, including efficiency, cost savings, and increased reliability and performance. Read Now!

Researcher warns "zombie browsers" are skyrocketing
Some Web browsers can be tricked into using so-called "malicious extensions" that can give hackers the ability to hijack the user's session, spy on webcams, upload and download files, and in the newer mobile-device area, hack into Google Android phones. Read More

Microsoft sued over use of live tiles in Windows
Microsoft has been slapped with a patent infringement lawsuit over its use of dynamic "live" tile icons in Windows, including in the newly launched Windows 8 OS for PCs and tablets and in the Windows Phone 8 OS for smartphones. Read More

Halloween for gamers: Tetris+Pumpkin=Pumpktris
Just when you thought Halloween couldn't get any geekier, we bring you Pumpktris, a combination of a jack-lantern and the classic game of Tetris. Read More

OpenFlow start-up Big Switch lands another big funding round
OpenFlow controller start-up Big Switch Networks this week said it closed a $25 million Series B funding round to continue the expansion of the engineering, sales and marketing operations. Read More


WEBCAST: Teradata

Big Data Done Right
View this on-demand webcast to learn how to reap the benefits of big data through a practical unified architecture; how to improve performance with in-memory technology; and how to lower costs and increase scalability through cloud computing. Register now.

Microsoft sponsors a hacking contest - the coding kind
In a dimly lit function room on the Microsoft campus 40 teams of coders are spending the week writing modern applications that run on Windows 8 and Windows Phone 8 devices, all of them assured of winning a prize. Read More

Sandy slams mobile, wired and cable networks as far west as Michigan
Post-Tropical Cyclone Sandy knocked out mobile, phone and cable service in many parts of the eastern U.S. on Monday, with about one in four cell sites affected in the hardest-hit band of the country between Virginia and Massachusetts, according to an FCC estimate. Read More

RSA Buys SilverTail Systems: Great fit, tremendous upside
I recently scheduled a breakfast meeting in November with an industry buddy who is an executive at RSA. When I first reached out to him late this past summer, I really wanted to arrange this meeting to suggest that RSA take a look at SilverTail Systems, a web fraud detection and security software provider I know quite well. Looks like I'll have to find some other topics for conversation because... Read More

Can Citrix Make Any Windows App or Desktop a Cloud Service?
Citrix is focused on helping enterprises deal with the challenge of running desktops and applications in a new mobile-centric world where tablets and smartphones proliferate. Read More

First Look: Google's Nexus 10 tablet
The Samsung-designed device is the first in the Nexus line to directly challenge the iPad. Read More

 
 
 

SLIDESHOWS

First look: Windows 8 Surface RT
Surface RT, the Microsoft-built tablet/notebook, offers a sleek design and sturdy feel.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Irked by cyberspying, Georgia outs Russia-backed hacker -- with photos
  2. First look: Google's Nexus 10 tablet
  3. Windows RT Surface tablet boasts excellent design, but it's still a tough sell
  4. EFF, 9 other groups, push Open Wireless Movement
  5. Microsoft greases the skids for Windows 8 developers
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. Cisco network really was $100 million more
  8. .xxx to launch porn search engine
  9. 2012 tech industry graveyard
  10. Want a security pro? For starters, get politically incorrect and understand geek culture
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

Siemens Enterprise Communications survey reviews productivity tools

  Dell ramps up converged infrastructure push with Active Systems | What Does Disney Buying Star Wars Have To Do With Open Source?
 
  Network World Convergence and VoIP

Forward this to a Friend >>>


Siemens Enterprise Communications survey reviews productivity tools
Siemens Enterprise Communications has published a study discussing the state of collaboration and other business productivity tools. Not surprisingly, the study showed virtual teams still rely on legacy tools such as email and phones, and they are frustrated by current collaboration technologies. The survey was based on a sample of 320 responses, with answers coming in from nine countries across North America, Latin America and Western Europe. Read More


RESOURCE COMPLIMENTS OF: Fluke Networks

Increase VoIP Quality for Call Centers
Once thought of as a business expense, call centers are now viewed as profit centers, especially in financial and retail environments. View short video,Maintaining high VoIP Quality for Call/Contact Centers with NetworkTime Machine, to learn how these departments rapidly identify problem domain and choke points in their network. Click to continue

WHITE PAPER: F5

Scale Your DNS Infrastructure to Protect Your Business
DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. This paper helps organizations confronting these growth and security challenges understand how a new, full-proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing. Learn More.

Dell ramps up converged infrastructure push with Active Systems
Dell on Thursday will outline the next phase of its strategy to move up the IT value chain and sell higher-value systems that combine hardware and software for building out data center infrastructure. Read More


WHITE PAPER: Cisco Systems

Cisco Wide Area Application Services Software Release 5.0
Cisco® Wide Area Application Services (WAAS) provides the industry's most scalable, highest performance WAN optimization solution. Cisco WAAS is able to improve end user experience and reduce bandwidth for key applications. Learn more.

What Does Disney Buying Star Wars Have To Do With Open Source?
Big as in Four Billion Dollars big, news yesterday that Disney acquired Lucasfilm including the Star Wars franchise from its single sharehol Read More


WHITE PAPER: Citrix Systems

Join the scale revolution for cloud ready networks
Today's cloud evolution requires a full scale revolution. Citrix TriScale technology transforms enterprise data centers into highly scalable enterprise clouds. Download this whitepaper and learn how to scale your cloud network for more elastic performance, seamless expansion and simple consolidation. Learn More

SAP goes after Salesforce.com with new social software products, strategy
SAP on Wednesday made a series of announcements meant to define itself as a major player in the enterprise social software market with a superior approach to rivals such as Salesforce.com. Read More

First Look: Google's Nexus 10 tablet
The Samsung-designed device is the first in the Nexus line to directly challenge the iPad. Read More

 
 
 

SLIDESHOWS

First look: Windows 8 Surface RT
Surface RT, the Microsoft-built tablet/notebook, offers a sleek design and sturdy feel.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Irked by cyberspying, Georgia outs Russia-backed hacker -- with photos
  2. First look: Google's Nexus 10 tablet
  3. Windows RT Surface tablet boasts excellent design, but it's still a tough sell
  4. EFF, 9 other groups, push Open Wireless Movement
  5. Microsoft greases the skids for Windows 8 developers
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. Cisco network really was $100 million more
  8. .xxx to launch porn search engine
  9. 2012 tech industry graveyard
  10. Want a security pro? For starters, get politically incorrect and understand geek culture
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **