Friday, April 18, 2014

Windows XP's retirement turns into major security project for Chinese firm

Tor anonymity network to shrink as a result of Heartbleed flaw | Why Americans are scared about the future of drones, robots, and wearables

Network World Security

Forward this to a Friend >>>


Windows XP's retirement turns into major security project for Chinese firm
Microsoft may have retired Windows XP, but one of China's leading security vendors is trying to keep the OS threat-free, and rolling out protection software to hundreds of millions of users in the nation. Read More


WHITE PAPER: Network Instruments

Your Guide to Troubleshooting VoIP
Real-time voice communications are sensitive to delay and variation in packet arrival times. This paper guides you through the essentials of VoIP troubleshooting, including common problems as well as the metrics you should employ to fix and prevent them. Learn More

WHITE PAPER: Crittercism

Top 10 Internet Applications Most Likely to be Mobilized
Effective mobile application performance management optimizes application availability and response time, ensuring the best user experience. Learn the difference the right management tools make and why tools that monitor the network or focus only on performance at the device level are not enough. Read now!

Tor anonymity network to shrink as a result of Heartbleed flaw
The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity. Read More

Why Americans are scared about the future of drones, robots, and wearables
Generally, most Americans are optimistic about the impact of technology on the future, specifically in regards to its impact on healthcare. A recent Pew Research report shows that 81% of responding Americans expect that patients in need of a transplant will be able to receive lab-grown organs within the next 50 years, for example. However, concerns over technology that is already controversial today... Read More

Will the Internet of Things Become the Internet of Broken Things?
Fifty billion devices will connect to the Internet in the next few years. It's up to vendors to make sure they do, in fact, connect to the Internet -- and provide reliable data, security and customer experience. Otherwise, analysts warn, the future may bring an Internet of Broken Things. Read More


WHITE PAPER: HP and Intel® Xeon® processors

HP BladeSystem Leadership and Innovation for Data Centers
In Gartner's 2013 Blade Server Magic Quadrant, HP has been positioned as a leader for completeness of vision and ability to execute. Read this paper to learn why HP BladeSystem is the leading choice of IT professionals. Learn More

Facebook users targeted by iBanking Android trojan app
Cybercriminals have started using a sophisticated Android Trojan app designed for e-banking fraud to target Facebook users, possibly in an attempt to bypass the two-factor authentication protection on the social network. Read More

Beyond the usual suspects: 10 hot programming languages on the rise
From Ceylon to Egison, these 10 languages tackle tough programming problems in unique and increasingly popular ways Read More

How a cyber cop patrols the underworld of e-commerce
Melissa Andrews, a resident of Canada, is a cyber security "cop" for Payza, an international e-commerce payment platform operating in 97 countries. Her job, described by the company's public relations firm as "the worst security job on the Internet," is to protect the public from illegal, and many times revolting, content, by shutting the sites down and alerting authorities about criminal activity. She spoke with CSO this week about her job and why she is proud of what she does. Read More


WHITE PAPER: HP and Intel®

IDC Analyst Connection - Converged Systems: Key Requirements
The following questions were posed by HP to Jed Scaramella, research director for IDC's Enterprise Platforms and Datacenter Trends practice, on behalf of HP's customers. Learn More>>

The IRS uses computers?! The horror!
It's impossible to imagine the Internal Revenue Service or most other number-crunching agencies or companies working without computers. But when the IRS went to computers -- the Automatic Data Processing system --there was an uproar. The agency went so far as to produce a short film on the topic called Right On The Button, to convince the public computers were a good thing. Read More

13 pieces of classic software whose code is now accessible
The source code behind proprietary software doesn't always remain hidden forever. Here are a baker's dozen examples where the code behind well-known applications has come to light Read More

Think tank challenges Heartbleed handwringing
A think tank opinion piece that claims the threat from the Heartbleed bug is overblown has sparked a debate among researchers over the seriousness of the OpenSSL flaw. Read More


SLIDESHOWS

10 Big Data startups to watch

These 10 startups to watch were chosen based on third-party validation, experience, and market potential.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. The IRS uses computers?! The horror!

2. First look: Ubuntu 14.04 LTS

3. Fortinet, McAfee, Trend Micro, Bitdefender battle in socially-engineered malware prevention test

4. Still deploying 11n Wi-Fi? You might want to think again

5. How users are fixing Windows 8.1 Update install problems

6. 9 Things You Need to Know Before You Store Data in the Cloud

7. Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab

8. Docker becomes de facto Linux standard

9. Kill switches coming to iPhone, Android, Windows devices in 2015

10. Microsoft releases new-and-improved Threat Modeling Tool 2014


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment