Daily News: AM
Network World Daily News: AM, 06/26/07 Can cell phones be hacked? A Tacoma, Wash., family is claiming the cell phones it uses have been taken over by hackers, who are turning them on at will, capturing conversations and manipulating the cell phone camera. The story of the Kuykendall family, as reported in the Tacoma News Tribune last week, seems an unlikely one, with tales of how they believe their cell phones, as well as those owned by other families, have been taken over and cell-phone cameras mysteriously turned on and off. While the mystery of the Kuykendall family’s cell-phone experience isn’t fully explained, people are wondering whether such events are even possible. Security experts say yes - but still in the realm of the unlikely. WAN optimization to the max WAN optimization appliances take on client-side acceleration, network security, troubleshooting and more as specialty vendors stave off competition from network-based alternatives. Summer gadget guide Cool Tools to entertain or keep you connected. Plus: slideshow Compare Products with Network World's VoIP and Convergence Buyer's Guide From deployable IP-PBX systems to unified messaging, Network World has detailed information on hundreds of products. Side-by-side comparisons along with objective test and review results make it quick and easy to find the solutions that are right for your enterprise. Click here to find out more. | | Sophos upgrades endpoint security suite Sophos upgrades its endpoint antivirus software with intrusion prevention features, control over unauthorized applications, and new management features. Catbird brings security to VMware customers Catbird unveils V-Agent virtualization security product for VMware. Rivermine brings in $8.7 million in third round Rivermine announced Monday that it closed its third round of financing bringing in $8.7 million. R U there? Feds want presence systems, survey says Federal network managers are hot on presence applications that enable real-time notification and identification systems, according to a Cisco survey. ICANN to tackle transparency, top-level domains, in meeting The Internet Corporation for Assigned Names and Numbers opened a week-long meeting on Monday where it will address critical issues like new generic top-level domains, internationalized domain names and the organization's efforts to become more ... Funding, security top issues for gov't telecom managers U.S. government agencies are interested in unified communications systems that integrate voice, video and data over Internet Protocol, but they have concerns about funding and security, according to a survey released Monday. Video Optimizing WAN performance How did GHAFARI Companies use application acceleration technology to move large files between offices and give LAN-like performance to remote outposts? Robert Bell, director of IT, explains on this edition of Voices from IT Roadmap. Blogs Buzzblog: Early iPhone lines and long-ago tales They're lining up... already? Nutty, sure, but who hasn't done this sort of thing? I've done it twice. Please share your stories with us online. Today on Layer 8, where we have to say if we spent all that time and money inventing something you can bet we'd name it ourselves: Researchers a the University of Maryland have come up with a desktop parallel computing system they say is 100 times faster than current PCs - and the kicker is, they want you to name it. |
No comments:
Post a Comment