Monday, January 26, 2009

10M infected PCs just the start; New Brocade CTO takes aim at Cisco; Intel's Barrett to retire

Network World logo

Daily News AM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Qualys
rule

Automating Security Compliance.
Simplify and automate the convergence of security and compliance with software as a service (SaaS). Find out how in this whitepaper, "Four Key Steps to Automating IT Security Compliance." The benefits include: Mitigating risk and eliminating threats, monitoring and measuring network compliance and customized security and compliance reports. Download this whitepaper now.

rule

Spotlight Story

Downadup/Conflicker worm: When will the next shoe fall?
By Ellen Messmer
The Downadup worm - also called Conflicker - has now infected an estimated 10 million PCs worldwide, and security experts say they expect to see a dangerous second-stage payload dropped soon. Read full story
Plus: Conficker hitting hardest in Asia, Latin America

Related News:

Craig Barrett to retire from Intel
After 35 years with the company, Craig Barrett plans to retire as chairman of Intel in May, the chip maker announced Friday.

Brocade's new CTO takes aim at Cisco
Dave Stevens is in his second go-round as CTO of Brocade, but this time the company has much bigger aspirations.

Heartland tries to rally industry in wake of data breach
The CEO of Heartland Payment Systems is calling for the card payments industry to share security information and consider end-to-end encryption.

Global telecom is bright spot amid tech industry woes
Microsoft and Google may have reported less than stellar financial results this week, but telecommunications companies worldwide are holding their own, according to reports from the 31st Pacific Telecommunications ...

Pack rat nation
As they play in the global information economy, U.S companies stash away more data than they can handle effectively. The six-part 2009 New Data Center series opens with a look at how they're coping with the escalating problem.

Facebook now twice as popular as MySpace
The pioneer of the social networking phenomenon has been totally overshadowed as Facebook recorded almost double the number of global visitors in December than long-time leader MySpace.

Cisco scammers in the slammer
It doesn't pay to commit crimes against Cisco. In separate cases this week, two Cisco scammers were sentenced to jail for commiting crimes with Cisco gear.

IBM confirms layoffs
Despite releasing stronger than expected earnings on Tuesday and at the time expressing optimism for 2009, a round of job cuts is underway at IBM Corp. and it looks like Big Blue's Canadian operations have not been ...

Amazon cloud could be security hole
Cloud services are now vulnerable to malicious use, a security company has suggested, after a techie worked out how Amazon's EC2 service could be used as a BitTorrent file harvester and host.

Monster.com reports theft of user data
Monster.com is advising its users to change their passwords after data including e-mail addresses, names and phone numbers were stolen from its database.

Microsoft to deliver first IE8 release candidate Monday
Microsoft plans to deliver the first release candidate of the next version of Internet Explorer on Monday, according to sources familiar with the company's plans.

Is Obama's handheld a Blackberry or something else?
The decision announced Thursday that President Barack Obama will keep his BlackBerry, or some version of a wireless handheld, amid tight White House security would seem to take a back seat to global terrorism and ...

Today on Cisco Subnet
How the economy might hamper security efforts; New logos for Cisco certifications; Cisco distributor says customers demanding HP ProCurve.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Qualys
rule

Automating Security Compliance.
Simplify and automate the convergence of security and compliance with software as a service (SaaS). Find out how in this whitepaper, "Four Key Steps to Automating IT Security Compliance." The benefits include: Mitigating risk and eliminating threats, monitoring and measuring network compliance and customized security and compliance reports. Download this whitepaper now.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.


IT Search: Recapture Control Over Your IT Infrastructure.
Introducing IT Search, a scalable, versatile and dynamic way to manage the modern data center. Read how IT Search will help your team find and fix problems faster, follow the trail of attackers, and trace transactions accurately using a holistic view across all components.
Learn more today.

 

01/26/09

Today's most-read stories:

  1. Apple puts iPhone Nano and Netbook rumors to rest
  2. White House confirms: ObamaBerry is a go
  3. In Las Vegas, data center takes power, cooling to the limit
  4. Bull castration and snake eaters: the life of Dave Hitz
  5. Nortel chief flying in corporate jet as company files for bankruptcy
  6. Top 10 YouTube hacking videos
  7. Ballmer provides grim outlook as economy 'resets'
  8. First Killzone 2 reviews roll in
  9. Heartland breach raises questions about PCI standard's effectiveness
  10. Layoffs: Microsoft bent, but not broken


Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment